Security Issues in Mobile Ad Hoc Networks

Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led...

Full description

Saved in:
Bibliographic Details
Main Authors: A. L. Sandoval Orozco, J. García Matesanz, L. J. García Villalba, J. D. Márquez Díaz, T.-H. Kim
Format: Article
Language:English
Published: Wiley 2012-11-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2012/818054
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850169158446088192
author A. L. Sandoval Orozco
J. García Matesanz
L. J. García Villalba
J. D. Márquez Díaz
T.-H. Kim
author_facet A. L. Sandoval Orozco
J. García Matesanz
L. J. García Villalba
J. D. Márquez Díaz
T.-H. Kim
author_sort A. L. Sandoval Orozco
collection DOAJ
description Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.
format Article
id doaj-art-a679bbc7622d413183e40c7a9d2002e7
institution OA Journals
issn 1550-1477
language English
publishDate 2012-11-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-a679bbc7622d413183e40c7a9d2002e72025-08-20T02:20:48ZengWileyInternational Journal of Distributed Sensor Networks1550-14772012-11-01810.1155/2012/818054Security Issues in Mobile Ad Hoc NetworksA. L. Sandoval Orozco0J. García Matesanz1L. J. García Villalba2J. D. Márquez Díaz3T.-H. Kim4 Grupo de Análisis, Seguridad y Sistemas (GASS), Departamento de Ingeniería del Software e Inteligencia Artificial (DISIA), Facultad de Informática, Universidad Complutense de Madrid (UCM), Despacho 431, Calle Profesor José García Santesmases s/n, Ciudad Universitaria, 28040 Madrid, Spain Grupo de Análisis, Seguridad y Sistemas (GASS), Sección Departamental de Sistemas Informáticos y Computación, Lenguajes y Sistemas Informáticos y Ciencias de la Computación e Inteligencia Artificial-Facultad de Ciencias Matemáticas, Universidad Complutense de Madrid (UCM), Despacho 310-F, Plaza de Ciencias, 3, Ciudad Universitaria, 28040 Madrid, Spain Grupo de Análisis, Seguridad y Sistemas (GASS), Departamento de Ingeniería del Software e Inteligencia Artificial (DISIA), Facultad de Informática, Universidad Complutense de Madrid (UCM), Despacho 431, Calle Profesor José García Santesmases s/n, Ciudad Universitaria, 28040 Madrid, Spain Grupo de Redes de Computadores e Ingeniería de Software (GRECIS), Departamento de Ingeniería de Sistemas, Universidad del Norte, Km 5 Autopista a Puerto Colombia, Barranquilla, Colombia School of Information Science, GVSA and UTAS, 20 Virginia Court, Sandy Bay, Hobart, TAS 7001, AustraliaAd hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.https://doi.org/10.1155/2012/818054
spellingShingle A. L. Sandoval Orozco
J. García Matesanz
L. J. García Villalba
J. D. Márquez Díaz
T.-H. Kim
Security Issues in Mobile Ad Hoc Networks
International Journal of Distributed Sensor Networks
title Security Issues in Mobile Ad Hoc Networks
title_full Security Issues in Mobile Ad Hoc Networks
title_fullStr Security Issues in Mobile Ad Hoc Networks
title_full_unstemmed Security Issues in Mobile Ad Hoc Networks
title_short Security Issues in Mobile Ad Hoc Networks
title_sort security issues in mobile ad hoc networks
url https://doi.org/10.1155/2012/818054
work_keys_str_mv AT alsandovalorozco securityissuesinmobileadhocnetworks
AT jgarciamatesanz securityissuesinmobileadhocnetworks
AT ljgarciavillalba securityissuesinmobileadhocnetworks
AT jdmarquezdiaz securityissuesinmobileadhocnetworks
AT thkim securityissuesinmobileadhocnetworks