APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW

https://doi.org/10.48185/jitc.v4i2.930

Authors

Keywords:

MANET, Routing Protocols, Security Vulnerabilities, Infrastructure-less Networks

Abstract

Mobile Ad hoc Networks (MANETs) have been very popular for some years now owing to their ability to allow communication in dynamic and infrastructure-less environments. However, the unique characteristics of MANETs, such as node mobility, limited power resources, and absence of centralized infrastructure, pose challenges in ensuring efficient routing and robust security. This paper presents a review of the existing techniques aimed at improving routing protocols and security in MANETs. Scholarly articles, conference papers, and technical reports published in notable research outlets were sourced. Then, the papers were categorized into two main areas: routing techniques and security mechanisms based on the target of this work. Regarding routing techniques, this review discusses the evolution of traditional routing protocols, including proactive, reactive, and hybrid approaches, and highlights their strengths and limitations. Moreover, the review presents some recent advancement such as location-based, Quality of Service (QoS)-aware, and energy-efficient routing protocols, which address specific challenges in MANETs. In terms of security mechanisms, this review provides an overview of the various threats and attacks that MANETs are susceptible to, including black hole, wormhole, and Sybil attacks. The review then examines the countermeasures proposed in the literature to tackle the security challenges. This article further highlights the emerging trends and research directions in the field of MANETs which include blockchain-based security, machine learning-assisted routing, and Internet of Things (IoT) integration. It is believed that this review can provide further insights to researchers in this domain.

Downloads

Download data is not yet available.

References

Alslaim, M. N., Alaqel, H. A., & Zaghloul, S. S. (2014). A comparative study of MANET routing protocols. In The Third International Conference on e-Technologies and Networks for Development (ICeND2014) (pp. 178-182) , IEEE.

Bhatnagar, G., Gobi, N., Aqeel, H., & Solanki, B. S. (2023). Sparrow-based Differential Evolutionary Search Algorithm for Mobility Aware Energy Efficient Clustering in MANET Network. International Journal of Intelligent Systems and Applications in Engineering, 11(8s), 135-142.

Conti Marco & Giordano Silvia (2007).Multihop Ad Hoc Networking: The Reality,IEEE Communications Magazine 45(4):88 – 95, Follow journal, DOI: 10.1109/MCOM.2007.343617,IEEE Xplore

David Alexis, Cordova Morales, Alexandre Laube, Nguyen Thi, Mai Trang, Guy Pujolle (2020). Blockgraph: A blockchain for mobile ad hoc networks. In 2020 4th cyber security in networking conference (CSNet) (pp. 1-8). IEEE.

Deepak Sinwar, Nisha Sharma, Sunil Maakar & Sudesh Kumar (2020). Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET, Journal of Information and Optimization Sciences 41(2):621-632, DOI: 10.1080/02522667.2020.1733193

Dilli, R., & Reddy, P. C. S. (2016, October). Implementation of security features in MANETs using SHA-3 standard algorithm. In 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) (pp. 455-458). IEEE.

Ghodichor, N., Sahu, D., Borkar, G., & Sawarkar, A. (2023). Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet. arXiv preprint arXiv:2304.04254.

Goswami M. M., (2017) “AODV based adaptive distributed hybrid multipath routing for mobile AdHoc network,” in Proc. International Conference on Inventive Communication and Computational Technologies, pp. 410-414.

Ibrahim H. A., Ahmed A. S., Sundaram B. B., Karthika P., (2021), Prevention of Rushing Attack in AOMDV using Random Route Selection Technique in Mobile Adhoc Network, Proceedings of Fifth Int. Conf. on Electronics, Communication and Aerospace Tech. (ICECA2021) IEEE.

Karthik S, Kannan S., Arunachalam V. P., Ravichandran T., and Valarmathi M. L..(2010).An investigation about performance comparison of multihop wireless ad-hoc network routing protocols in MANET, International Journal of Computer Science Issues (IJCSI), 7(3), pp. 35— 41.

Khalifa M. M., Nuri O., Ali Alheeti K. M., (2021).New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques, International Conference of Modern Trends in Information and Communication Tech. Industry (MTICTI) IEEE.

Khan A. U., Chawhan M. D., Mushrif M. M., Neole B., (2021).Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network, Proceedings of the Fifth Int. Conf. on Intelligent Computing and Control Systems (ICICCS 2021), IEEE Xplore Part Number: CFP21K74-ART; ISBN: 978-0-7381-1327-2.

Khudayer, B. H., Alzabin, L. R., Anbar, M., Tawafak, R. M., Wan, T. C., AlSideiri, A., ... & Al-Amiedy, T. A. (2023). A Comparative Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks. International Journal of Advanced Computer Science and Applications, 14(4).

Korir, F., & Cheruiyot, W. (2022). A survey on security challenges in the current MANET routing protocols. Global Journal of Engineering and Technology Advances, 12(01), 078-091.

Kumar S., and Kumar J. (2012).Comparative analysis of proactive and reactive routing protocols in mobile ad-hoc networks (MANET), Journal of Information and Operations Management, 3(1), pp. 92—95.

Kumar V. and Singla S., (2022). Performance Analysis of Optimized ACO-AOMDV Routing Protocol with AODV and AOMDV in MANET, in Advances in Computing and Data Sciences: 6th International Conference, ICACDS 2022, Kurnool, India, April 22–23, 2022, Revised

Kwan-Wu Chin, John Judge, Aidan Williams & Roger Kermode Sydney (2019). Networks and Communications Lab Motorola Australia Research Centre 12 Lord St, Botany, NSW, Australia {kwchin, johnj, aidan, rkermode}@arc.corp.mot.com

Mamood, A., & Zengin, A. (2021). Performance Evaluation of MANET Routing Protocols AODV and DSDV Using NS2 Simulator. Sakarya University Journal of Computer and Information Sciences, 4(1), 1-10.

Murugeshwari B., Saral Jeeva Jothi D., Hemalatha B.,Neelavathy Pari S. (2023).Trust Aware Privacy Preserving Routing Protocol for Wireless Adhoc Network, International Journal of Engineering Trends and Technology Volume 70 Issue 9, 362-370, September 2022, ISSN: 2231 – 5381 / https://doi.org/10.14445/22315381/IJETT-V70I9P236 © 2022 Seventh Sense Research Group®

Minhas, H. Mahmood, & H. Malik,(2012). Incentive driven cooperation to avoid packet loss in multihop ad hoc networks, in 2012 International Conference on Emerging Technologies, 2012, 1–6.

Nithya, R., Amudha, K., Musthafa, A. S., Sharma, D. K., Ramirez-Asis, E. H., Velayutham, P., ... & Sengan, S. (2022). An optimized fuzzy-based ant colony algorithm for 5G-MANET. Computers, Materials & Continua, 70(1), 1069-1087.

Oyelakin, A. M., Yusuf, S. A., Agboola, R. O., & Abdullahi, F. (2020). A Study on The Comparative Analysis Of MANET Routing Protocols In Nomadic Community Scenario. Amity Journal of Computational Sciences (AJCS) Volume 4 Issue 1 ISSN: 2456-6616.

Oyelakin A.M. & Jimoh R.G. (2018). Simulation of Mobile Ad-hoc Network and its Applicability in Academic Scenario, in proceedings of 10th iSTEAM Multi-Disciplinary Conference, February,2018 Conference, Delta State Polytechnic, Ogwuashi-uku, Delta State, Nigeria,679-687

Pandey, K., & Swaroop, A. (2011). A comprehensive performance analysis of proactive, reactive and hybrid manets routing protocols. arXiv preprint arXiv:1112.5703.

Pooja Rani, Kavita, Sahil Verma and Gia Nhu Nguyen, (2020), Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm with Artificial Neural Network, IEEE.

Prasath, N., & Sreemathy, J. (2019). Optimized dynamic source routing protocol for MANETs. Cluster Computing, 22(Suppl 5), 12397-12409.

Praveen Bondada, Debabrata Samanta Manjit , Kaur Kaur & Heung-No Lee (2022).Data Security-Based Routing in MANETs Using Key Management Mechanism, January 2022, Applied Sciences, 12(3):1041,DOI: 10.3390/app12031041

Raheem Ali H. (2011). Security Issues in Mobile Ad-Hoc Network and Solutions,Telecommunication Systems, 1-6

Raza, N., Umar Aftab, M., Qasim Akbar, M., Ashraf, O., & Irfan, M. (2016). Mobile ad-hoc networks applications and its challenges. Communications and Network, 8(03), 131-136.

Regassa D., Yeom H. Y., Son Y., (2022), Efficient Attacker Node(s) Detection and Isolation Schemes in MANETs OLSR Protocol, Int. Conf. on Information Networking (ICOIN) IEEE.

Revathi, P., Karpagavalli, N., & Angel, K. J. C. A Hybrid Approach For Cost-Effective Routing And Security For Manets Using BSSO-DSR And AES-ECC Algorithms.

Sivapriya, N., & Mohandas, R. (2022). Analysis on Essential Challenges and Attacks on MANET Security Appraisal. Journal of Algebraic Statistics, 13(3), 2578-2589.

Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269.

Sun .Z, Wei M., Zhang .Z., and Qu .G (2019).Secure Routing Protocol based on Multi-Objective Ant-colony-optimization for wireless sensor networks, Appl. Soft Comput. J., vol. 77, pp. 366–375.

Sultana Jeenat & Ahmed Tasnuva (2017).Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), February 2017, DOI: 10.1109/ECACE.2017.7912964

Thakker, V. M., Reddy, G. M., Kumar, K. V., & Moses, D. (2018). Choosing optimal routing protocol by comparing different multipath routing protocols in mobile Adhoc networks. In 2018 2nd International Conference on Inventive Systems and Control (ICISC) (pp. 1284-1290). IEEE.

Thiagarajan R. and M. Moorthi,( 2017). Efficient routing protocols for mobile ad hoc network,” in Proc. Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bioinformatics,. 427-43

Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021). Optimised with secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communications, 119, 21-35.

Umesh K. S., Mewada S., Iaddhani L., & Bunkar K. (2011).An overview and study of security issues & challenges in mobile ad-hoc networks (MANET), International Journal of Computer Science and Information Security, 9(4), pp. 106—111.

Published

2023-12-30

How to Cite

R. O, R. . ., & OYELAKIN, A. M. (2023). APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW. Journal of Information Technology and Computing, 4(2), 20–30. https://doi.org/10.48185/jitc.v4i2.930

Issue

Section

Articles