Skip to main content

Challenges, Attacks, and Countermeasures for Security in MANETs-IoT

  • Conference paper
  • First Online:
Cryptology and Network Security with Machine Learning (ICCNSML 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 918))

  • 82 Accesses

Abstract

The integration of Mobile Ad hoc Networks and the Internet of Things offers innovative applications but also presents significant security challenges. This paper explores these challenges, considering the decentralized nature of both MANETs and IoT. Security vulnerabilities, including unauthorized access and malicious attacks, emerge due to factors like node mobility and resource constraints. Existing security mechanisms are examined and found insufficient for this combined environment. The primary security issues are confidentially, integrity, availability, blackhole, wormhole, grayhole, rushing, flooding, attacks, authentication, intrusion detection, and trust management tailored to MANET-IoT systems. The urgent need for comprehensive security strategies to ensure safe operation of this ecosystem is emphasized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Belgaum MR, Musa S, MohdSu’ud M, Alam M, Soomro S, Alansari Z (2019) Secured approach towards Reactive Routing Protocols using Triple factor in Mobile Ad hoc Networks. Ann Emerg Technol Comput (AETiC). https://doi.org/10.33166/AETiC.2019.02.004

  2. Sharma PK, Sharma V (2016) Survey on security issues in MANET: Wormhole detection and prevention. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 637–640. https://doi.org/10.1109/CCAA.2016.7813799

  3. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164. https://doi.org/10.1016/j.comnet.2014.11.008

    Article  Google Scholar 

  4. Gil D, Ferrandez A, Mora-Mora H, Peral J (2016) Internet of things: a review of surveys based on context aware intelligent services. Sensors. https://doi.org/10.3390/s16071069

    Article  Google Scholar 

  5. Das D, Majumder K, Dasgupta A. A game-theory based secure routing mechanism in mobile ad hoc network. In: International Conference on Computing, Communication and Automation (ICCCA), vol 29. IEEE, pp 437–442. https://doi.org/10.1109/CCAA.2016.7813816.

  6. Bagaa M, Taleb T, Bernabe JB, Skarmeta A (2020) A machine learning security framework for IoT systems. IEEE Access 8:114066–114077. https://doi.org/10.1109/ACCESS.2020.2996214

    Article  Google Scholar 

  7. Kim J, Shim M, Hong S, Shin Y, Choi E (2020) Intelligent detection of iot botnets using machine learning and deep learning. Appl Sci 10:7009. https://doi.org/10.3390/app10197009

    Article  Google Scholar 

  8. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045

    Article  Google Scholar 

  9. Mohanta BK, Jena D, Satapathy U, Patnai S (2020) Survey on IoT security: challenges and solution using machine learning. Artif Intell Blockchain Technol. https://doi.org/10.1016/j.iot.2020.100227

    Article  Google Scholar 

  10. Pothuganti S (2020) Overview on security issues in cloud computing. Int J Innov Res Comput Commun Eng 10:4064–4068

    Google Scholar 

  11. Rao PM, Saraswathi P (2021) Evolving cloud security technologies for social networks. In: Security in IoT Social Networks. Elsevier: Amsterdam, pp 179–203. https://doi.org/10.1016/B978-0-12-821599-9.00008-X

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anuja Priyam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Priyam, A., Yadav, A. (2024). Challenges, Attacks, and Countermeasures for Security in MANETs-IoT. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2023. Lecture Notes in Networks and Systems, vol 918. Springer, Singapore. https://doi.org/10.1007/978-981-97-0641-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0641-9_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0640-2

  • Online ISBN: 978-981-97-0641-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics