MANET Case Study

Improved Essays
There are many pros and cons when it comes to the use and creation of a MANET. A brief background highlighting what MANETs are; the key features in MANETs; as well as the possible vulnerabilities that MANETs are prone to, will be given below. Once this has been provided, the concept of a Black Holes in MANETs will be introduced and described. The rest of this paper then seeks to explain how Black Holes can affect and compromise MANETs.
4.1 Background Kaushik and Dureja (2013) define mobile ad-hoc networks (or MANETs) as temporary ‘infrastructure-less’ network topology’s which are formed when a system of wireless mobile nodes establish their own dynamic network on the fly, without relying on any pre-existing communication infrastructure. These
…show more content…
Wireless links between nodes can be unreliable – Wireless nodes have a limited amount of energy available at any given time which could result in a node becoming unavailable for communication when its power is depleted. These wireless links are also susceptible to attacks. Unlike wired networks in which the adversary first needs to gain actual physical access to the network, in wireless ad-hoc networks the adversary can attack from any link and target any node. These ad-hoc networks don’t have a clear defence line, as such each and every node must be prepared to defend itself from threats.
2. Network topology’s are continuously changing – Each time a node is moved in or out of radio range from other nodes, the routing information needs to be updated to cater for this change. Therefore, tracking a specific node in a large scale MANET presents a complicated task, as each node has the potential to be a rapidly moving target.
3. Setup as an Infrastructure-less Network – This makes it difficult to enforce security from a central point which means that security is reliant on all nodes adopting a cooperative security
…show more content…
Therefore, careful attention needs to be given to these issues in order to prevent them from occurring or dealing with them should they occur.
4.3 Vulnerabilities of MANETs
MANETs are far more vulnerable than traditional wired networks, due to the fact that security is far more difficult to enforce in MANETs. According to Mohebi and Scott (2013), some of these vulnerabilities are as follows:
1. Lack of secure boundaries – MANETs are more susceptible to attacks as attacks can originate from any node that is within radio range of another node in the MANET or via routing from node to node. Most commonly these attacks include data tampering, message replay and contamination, DOS attacks and leakage of information to name just a few. These attacks can make it hard for nodes in the network to resist the attack as the nodes being attacked don’t recognise it as an attack.
2. Compromised nodes inside a MANET – This is when an adversary attempts to take control of a node in a MANET, in order to perform an attack that will seem to originate from the compromised

Related Documents

  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    E. Also suppose a malicious node M can hear A, B, C and D. The attack can be described as follows:[18] “To start the attack, M changes its MAC address to match A’s, moves closer to and out of the range of A. It then sends an RREP to B that contains a hop count to X that is less than the one sent by C, e.g., zero. Therefore B changes its route to the destination, X, to go through A, as illustrated in Figure. 1.4.…

    • 210 Words
    • 1 Pages
    Decent Essays