Skip to main content

Review on Security Attacks and Mechanism in VANET and MANET

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 394))

Abstract

Ad hoc wireless communication is an infrastructure-less network and adaptable to all environments. It is characterized by self-organizing, dynamic topology, and self-healing. These characteristics are most common for both MANET and VANET. In these networks, security is a major concern for data transmission. Ad hoc security is violated by various security attacks. In this paper, we are analyzing the common security attacks and their exploitation in various layers. The various security mechanisms and protocols are discussed in both VANET and MANET for secure data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Bibliography

  1. Deng H, Li W, Agrawal DP. Routing security in wireless ad hoc networks. Telecommun Netw Sec IEEE Commun Mag. 2002;70–5.

    Google Scholar 

  2. Raya M, Papadmitratos P, Hubaux J-P. Securing vehicular communications. IEEE Wirel Commun. 2006.

    Google Scholar 

  3. Yang H, Luo H, Ye F, Lu S, Zhang L. Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun. 2004.

    Google Scholar 

  4. Kim Y, Kim I. Security issues in vehicular networks. Int Conf Inf Netw (ICOIN). 2013;468–72.

    Google Scholar 

  5. Kumar A, Sinha M. Overview on vehicular ad hoc network and its security issues. Int Conf Comput Sustain Glob Dev (INDIACom). 2014;792–7.

    Google Scholar 

  6. Rajakumar P, Prasanna Venkatesan T, Pitchaikkannu A. Security attacks and detection schemes in manet. Int Conf Electron Commun Syst (ICECS). 2014;1–6.

    Google Scholar 

  7. Ghosh C, Jana D, Bhaumik BB. Security challenges in reactive mobile ad hoc network. Ann IEEE India Conf (INDICON). 2011;1–6.

    Google Scholar 

  8. Kannhavong B, Nakayama H, Nemoto Y, Kato N. A survey of routing attacks in MANET. IEEE Wirel Commun. 2007.

    Google Scholar 

  9. Varshney N, Roy T, Chaudhary N. Security protocol for VANET by using digital certification to provide security with low bandwidth. Int Conf Commun Signal Process. 768–72.

    Google Scholar 

  10. Bhoi SK, Nayak RP, Dash D, Rout JP. RRP: a robust routing protocol for vehicular ad hoc network against hole generation attack. Int Conf Commun Signal Process. 1175–9.

    Google Scholar 

  11. Hou J, Han L, Liu J, Zhao J. Secure and efficient protocol for position-based routing in VANETs. IEEE Int Conf Intell Control Autom Detect High-End Equipment (ICADE). 2012;142–8.

    Google Scholar 

  12. Lu Y, Zhou B, Jia F, Gerla M. Group-based secure source authentication protocol for VANETs. IEEE, GLOBECOM workshops on heterogeneous, multi-hop wireless and mobile networks. 2010. P. 202–6.

    Google Scholar 

  13. Qian Y, Lu K, Moayeri N. A secure VANET MAC protocol for DSRC applications. IEEE Global Telecommun Conf. 2008;1–5.

    Google Scholar 

  14. Pandya M, Shrivastava AK. Improvising the performance with security of AODV routing protocol in MANETs. Nirma university international conference on engineering (NUiCONE). Int J Comput Appl. 2013;78(11).

    Google Scholar 

  15. Bhoi SK, Faruk IH, Khilar PM. CSRP: a centralized secure routing protocol for mobile ad-hoc network. Third international conference on emerging application of information technology. 2012. p. 429–32.

    Google Scholar 

  16. Wang B, Zhang J, Guo Y. APVP: an aggregate-based path verification routing protocol for the ad hoc networks. Int Conf Comput Intell Sec. 2008;386–9.

    Google Scholar 

  17. Tamil Selvi K, Kuppuswami S. Enhancing security in optimized link state routing protocol for MANET using threshold cryptography technique. Int Conf Recent Trends Inf Technol. 2014;1–6.

    Google Scholar 

  18. Dasgupta M, Choudhury S, Chaki N. A secure hypercube based team multicast routing protocols (S-HTMRP). IEEE Int Adv Comput Conf (IACC 2009). 2009;1265–8.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S Balasubramani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Balasubramani, S., Rani, S.K., Suja Rajeswari, K. (2016). Review on Security Attacks and Mechanism in VANET and MANET. In: Dash, S., Bhaskar, M., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 394. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2656-7_60

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2656-7_60

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2654-3

  • Online ISBN: 978-81-322-2656-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics