4.1 Background Kaushik and Dureja (2013) define mobile ad-hoc networks (or MANETs) as temporary ‘infrastructure-less’ network topology’s which are formed when a system of wireless mobile nodes establish their own dynamic network on the fly, without relying on any pre-existing communication infrastructure. These …show more content…
Wireless links between nodes can be unreliable – Wireless nodes have a limited amount of energy available at any given time which could result in a node becoming unavailable for communication when its power is depleted. These wireless links are also susceptible to attacks. Unlike wired networks in which the adversary first needs to gain actual physical access to the network, in wireless ad-hoc networks the adversary can attack from any link and target any node. These ad-hoc networks don’t have a clear defence line, as such each and every node must be prepared to defend itself from threats.
2. Network topology’s are continuously changing – Each time a node is moved in or out of radio range from other nodes, the routing information needs to be updated to cater for this change. Therefore, tracking a specific node in a large scale MANET presents a complicated task, as each node has the potential to be a rapidly moving target.
3. Setup as an Infrastructure-less Network – This makes it difficult to enforce security from a central point which means that security is reliant on all nodes adopting a cooperative security …show more content…
Therefore, careful attention needs to be given to these issues in order to prevent them from occurring or dealing with them should they occur.
4.3 Vulnerabilities of MANETs
MANETs are far more vulnerable than traditional wired networks, due to the fact that security is far more difficult to enforce in MANETs. According to Mohebi and Scott (2013), some of these vulnerabilities are as follows:
1. Lack of secure boundaries – MANETs are more susceptible to attacks as attacks can originate from any node that is within radio range of another node in the MANET or via routing from node to node. Most commonly these attacks include data tampering, message replay and contamination, DOS attacks and leakage of information to name just a few. These attacks can make it hard for nodes in the network to resist the attack as the nodes being attacked don’t recognise it as an attack.
2. Compromised nodes inside a MANET – This is when an adversary attempts to take control of a node in a MANET, in order to perform an attack that will seem to originate from the compromised