Abstract
The integration of Mobile Ad hoc Networks and the Internet of Things offers innovative applications but also presents significant security challenges. This paper explores these challenges, considering the decentralized nature of both MANETs and IoT. Security vulnerabilities, including unauthorized access and malicious attacks, emerge due to factors like node mobility and resource constraints. Existing security mechanisms are examined and found insufficient for this combined environment. The primary security issues are confidentially, integrity, availability, blackhole, wormhole, grayhole, rushing, flooding, attacks, authentication, intrusion detection, and trust management tailored to MANET-IoT systems. The urgent need for comprehensive security strategies to ensure safe operation of this ecosystem is emphasized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Belgaum MR, Musa S, MohdSu’ud M, Alam M, Soomro S, Alansari Z (2019) Secured approach towards Reactive Routing Protocols using Triple factor in Mobile Ad hoc Networks. Ann Emerg Technol Comput (AETiC). https://doi.org/10.33166/AETiC.2019.02.004
Sharma PK, Sharma V (2016) Survey on security issues in MANET: Wormhole detection and prevention. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 637–640. https://doi.org/10.1109/CCAA.2016.7813799
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164. https://doi.org/10.1016/j.comnet.2014.11.008
Gil D, Ferrandez A, Mora-Mora H, Peral J (2016) Internet of things: a review of surveys based on context aware intelligent services. Sensors. https://doi.org/10.3390/s16071069
Das D, Majumder K, Dasgupta A. A game-theory based secure routing mechanism in mobile ad hoc network. In: International Conference on Computing, Communication and Automation (ICCCA), vol 29. IEEE, pp 437–442. https://doi.org/10.1109/CCAA.2016.7813816.
Bagaa M, Taleb T, Bernabe JB, Skarmeta A (2020) A machine learning security framework for IoT systems. IEEE Access 8:114066–114077. https://doi.org/10.1109/ACCESS.2020.2996214
Kim J, Shim M, Hong S, Shin Y, Choi E (2020) Intelligent detection of iot botnets using machine learning and deep learning. Appl Sci 10:7009. https://doi.org/10.3390/app10197009
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045
Mohanta BK, Jena D, Satapathy U, Patnai S (2020) Survey on IoT security: challenges and solution using machine learning. Artif Intell Blockchain Technol. https://doi.org/10.1016/j.iot.2020.100227
Pothuganti S (2020) Overview on security issues in cloud computing. Int J Innov Res Comput Commun Eng 10:4064–4068
Rao PM, Saraswathi P (2021) Evolving cloud security technologies for social networks. In: Security in IoT Social Networks. Elsevier: Amsterdam, pp 179–203. https://doi.org/10.1016/B978-0-12-821599-9.00008-X
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Priyam, A., Yadav, A. (2024). Challenges, Attacks, and Countermeasures for Security in MANETs-IoT. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_27
Download citation
DOI: https://doi.org/10.1007/978-981-97-0641-9_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0640-2
Online ISBN: 978-981-97-0641-9
eBook Packages: EngineeringEngineering (R0)