SlideShare a Scribd company logo
Security Attack In MANET 
Nitin Verma 
2011BTechCSE005
What is MANET ? 
• MANET is a type of multi-hop network, infrastructure less and the most 
important self organizing. 
• Due to its wireless and distributed nature there is a great challenge for system 
security designers.
Characteristics 
• Dynamic Topologies 
• Energy-constrained Operation 
• Limited Bandwidth
Continued… 
• Note : One of the main characteristic of MANET’s with respect to 
security design point of view is the lack of clear line defence. 
• There is no well defined rule or place where traffic from different nodes 
should be monitored or access control mechanisms can be enforced. Due to 
this, there is no any defence line that separates inside network from the 
outside network
Challanges 
• Movability 
• Routing : 
PRO-ACTIVE 
RE-ACTIVE 
HYBRID
Security service 
• Authentication : means correct identity is known to communicating authority. 
• Confidentiality : means message information is kept secure from unauthorized 
access. 
• Integrity : means message is unaltered during the communication between two 
parties.
Types of attack 
• Active Attack 
• Passive Attack
Active attack 
• Attacker attempt to modify the data being exchange in network. 
• It may disrupts the normal functioning of network. 
• In active attack, the intruders can modify the packets, inject the packets, drop 
the packet or it can use various features of network to launch the attack.
Passive attack 
• Attackers snoop the data exchanged in network without altering it. 
• This attack target the confidentiality attribute of system. 
• It is very difficult to detect because the operation of network is not affected 
by this kind of attack.
Attacks in manet 
• Attacks in MANET can also be classified as :- 
• External attack : Carried out by node that do not belong to the domain of 
the network. 
• Internal attack : It is from compromised nodes, which are actually part of the 
network.
Black hole attack 
• A black-hole is a malicious node that falsely replies for route request without 
having an active route to the destination and exploits the routing protocol to 
advertise itself as having shortest route to destination. 
• By advertising the shortest route, source station starts sending data through 
the black hole node and it becomes the active element in route.
Wormhole attack 
• In this attack, an attacker records packets at one location in the network & 
tunnel them to another location. 
• When an wormhole attack is used against an on-demand routing protocol 
the attack could prevent the discovery of any routes other than through the 
wormhole.
Sleep Deprivation 
• It is also called as resource consumption attack. 
• An attacker can attempt to consume battery life by requesting excessive route 
discovery, or by forwarding unnecessary packet to the victim node.
Eavesdropping 
• The main goal of eavesdropping is obtain to confidential information that 
should be kept secret during the communication. 
• This confidential information may include the location, public key, private 
key or even password of nodes.
Flooding attack 
• RREQ Flooding 
• Data Flooding
RREQ flooding 
• In the RREQ flooding attack, the attacker broadcast the many RREQ packet 
for the IP which does not exist in the network. 
• Effects : 
Consumes network bandwidth. 
Consumes node battery power.
Data flooding 
• In this, data packets are used to flood the network. 
• Effects 
Hard to detect. 
Can be detected by the application layer.
Security mechanism 
• Preventive Mechanism : Conventional authentication & encryption scheme based on 
cryptography. 
Cryptography 
Hash function 
Digital signature 
• Reactive Mechanism : An intrusion detection system is used as second line of defence. 
Anomaly based IDS 
Signature based IDS
conclusion 
• Due to mobility & open media nature, the mobile ad-hoc networks are more 
prone to security threat compared to the wired network. 
• Therefore security need are higher in mobile ad-hoc networks as compared 
to traditional networks.
Security Issues in MANET

More Related Content

PPT
Attacks in MANET
PPTX
Security issues in manet
PPT
Security in mobile ad hoc networks
PDF
5G Security Briefing
PPTX
Hash Function
PPTX
Secure Hash Algorithm
PPSX
Key Challenges In CLOUD COMPUTING
Attacks in MANET
Security issues in manet
Security in mobile ad hoc networks
5G Security Briefing
Hash Function
Secure Hash Algorithm
Key Challenges In CLOUD COMPUTING

What's hot (20)

PPTX
Network traffic analysis with cyber security
PPTX
DVWA(Damn Vulnerabilities Web Application)
PDF
Honeypots for Network Security
PPT
Wireless security presentation
PDF
Wireshark Traffic Analysis
PPT
IDS and IPS
PDF
2. public key cryptography and RSA
PPT
Types of Load distributing algorithm in Distributed System
PPTX
Transport layer security (tls)
PPTX
Confidentiality using symmetric encryption.pptx
PPSX
Congestion control in TCP
PDF
Routing in Mobile Ad hoc Networks
PDF
IT6601 MOBILE COMPUTING
PDF
Network security & cryptography full notes
PPTX
Wired equivalent privacy (wep)
PPSX
Mobile ip overview
PPTX
Honeypot ppt1
PPTX
Intrusion detection system
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
Domain model Refinement
Network traffic analysis with cyber security
DVWA(Damn Vulnerabilities Web Application)
Honeypots for Network Security
Wireless security presentation
Wireshark Traffic Analysis
IDS and IPS
2. public key cryptography and RSA
Types of Load distributing algorithm in Distributed System
Transport layer security (tls)
Confidentiality using symmetric encryption.pptx
Congestion control in TCP
Routing in Mobile Ad hoc Networks
IT6601 MOBILE COMPUTING
Network security & cryptography full notes
Wired equivalent privacy (wep)
Mobile ip overview
Honeypot ppt1
Intrusion detection system
Symmetric and Asymmetric Encryption.ppt
Domain model Refinement
Ad

Viewers also liked (20)

PPTX
Mobile Ad hoc Networks
PPTX
Study of security attacks in manet
PDF
Attacks on mobile ad hoc networks
PPTX
Manet ppt
PPTX
Ad-Hoc Networks
PPTX
MANET
PPTX
Various Security Attacks in mobile ad hoc networks
PPT
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
PDF
Lecture 9 10 .mobile ad-hoc routing protocols
PPTX
Wormhole attack
PPT
Routing in Manet
PPT
Types of attacks and threads
PPTX
Attack lecture #2 ppt
PPTX
Ppt.1
PPT
PPTX
Mobile ad hoc network
PPTX
Cryptography
PPTX
Different types of attacks in internet
PDF
AODV protocol and Black Hole attack
Mobile Ad hoc Networks
Study of security attacks in manet
Attacks on mobile ad hoc networks
Manet ppt
Ad-Hoc Networks
MANET
Various Security Attacks in mobile ad hoc networks
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Lecture 9 10 .mobile ad-hoc routing protocols
Wormhole attack
Routing in Manet
Types of attacks and threads
Attack lecture #2 ppt
Ppt.1
Mobile ad hoc network
Cryptography
Different types of attacks in internet
AODV protocol and Black Hole attack
Ad

Similar to Security Issues in MANET (20)

PDF
A Review Paper on Network Layer attacks in MANETs
PDF
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
PDF
Protecting Global Records Sharing with Identity Based Access Control List
PPTX
Rm presentation on research paper
PDF
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
PDF
Security in manet via different intrusion detection techniques
PDF
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
PPTX
Security management in mobile ad hoc networks
PDF
50120130406016
PDF
Manet Security Breaches : Threat to A Secure Communication Platform
PDF
Ls3620132016
PPTX
Abdullah Mukhtar ppt
PDF
Survey of manet misbehaviour detection approaches
PDF
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
PDF
Attacks in manet
PDF
Attacks in manet
DOC
A table driven search approach for revelation and anticipation of sinkhole at...
DOC
A table driven search approach for revelation and anticipation of sinkhole at...
PDF
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
A Review Paper on Network Layer attacks in MANETs
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Protecting Global Records Sharing with Identity Based Access Control List
Rm presentation on research paper
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security in manet via different intrusion detection techniques
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Security management in mobile ad hoc networks
50120130406016
Manet Security Breaches : Threat to A Secure Communication Platform
Ls3620132016
Abdullah Mukhtar ppt
Survey of manet misbehaviour detection approaches
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
Attacks in manet
Attacks in manet
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
An ids scheme against black hole attack to secure aomdv routing in manet

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
web development for engineering and engineering
PDF
composite construction of structures.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
web development for engineering and engineering
composite construction of structures.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Operating System & Kernel Study Guide-1 - converted.pdf
Sustainable Sites - Green Building Construction
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Foundation to blockchain - A guide to Blockchain Tech
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Security Issues in MANET

  • 1. Security Attack In MANET Nitin Verma 2011BTechCSE005
  • 2. What is MANET ? • MANET is a type of multi-hop network, infrastructure less and the most important self organizing. • Due to its wireless and distributed nature there is a great challenge for system security designers.
  • 3. Characteristics • Dynamic Topologies • Energy-constrained Operation • Limited Bandwidth
  • 4. Continued… • Note : One of the main characteristic of MANET’s with respect to security design point of view is the lack of clear line defence. • There is no well defined rule or place where traffic from different nodes should be monitored or access control mechanisms can be enforced. Due to this, there is no any defence line that separates inside network from the outside network
  • 5. Challanges • Movability • Routing : PRO-ACTIVE RE-ACTIVE HYBRID
  • 6. Security service • Authentication : means correct identity is known to communicating authority. • Confidentiality : means message information is kept secure from unauthorized access. • Integrity : means message is unaltered during the communication between two parties.
  • 7. Types of attack • Active Attack • Passive Attack
  • 8. Active attack • Attacker attempt to modify the data being exchange in network. • It may disrupts the normal functioning of network. • In active attack, the intruders can modify the packets, inject the packets, drop the packet or it can use various features of network to launch the attack.
  • 9. Passive attack • Attackers snoop the data exchanged in network without altering it. • This attack target the confidentiality attribute of system. • It is very difficult to detect because the operation of network is not affected by this kind of attack.
  • 10. Attacks in manet • Attacks in MANET can also be classified as :- • External attack : Carried out by node that do not belong to the domain of the network. • Internal attack : It is from compromised nodes, which are actually part of the network.
  • 11. Black hole attack • A black-hole is a malicious node that falsely replies for route request without having an active route to the destination and exploits the routing protocol to advertise itself as having shortest route to destination. • By advertising the shortest route, source station starts sending data through the black hole node and it becomes the active element in route.
  • 12. Wormhole attack • In this attack, an attacker records packets at one location in the network & tunnel them to another location. • When an wormhole attack is used against an on-demand routing protocol the attack could prevent the discovery of any routes other than through the wormhole.
  • 13. Sleep Deprivation • It is also called as resource consumption attack. • An attacker can attempt to consume battery life by requesting excessive route discovery, or by forwarding unnecessary packet to the victim node.
  • 14. Eavesdropping • The main goal of eavesdropping is obtain to confidential information that should be kept secret during the communication. • This confidential information may include the location, public key, private key or even password of nodes.
  • 15. Flooding attack • RREQ Flooding • Data Flooding
  • 16. RREQ flooding • In the RREQ flooding attack, the attacker broadcast the many RREQ packet for the IP which does not exist in the network. • Effects : Consumes network bandwidth. Consumes node battery power.
  • 17. Data flooding • In this, data packets are used to flood the network. • Effects Hard to detect. Can be detected by the application layer.
  • 18. Security mechanism • Preventive Mechanism : Conventional authentication & encryption scheme based on cryptography. Cryptography Hash function Digital signature • Reactive Mechanism : An intrusion detection system is used as second line of defence. Anomaly based IDS Signature based IDS
  • 19. conclusion • Due to mobility & open media nature, the mobile ad-hoc networks are more prone to security threat compared to the wired network. • Therefore security need are higher in mobile ad-hoc networks as compared to traditional networks.