Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

被引:13
|
作者
Pamarthi, Satyanarayana [1 ]
Narmadha, R. [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
关键词
Network security; Wireless sensor network; Mobile ad-hoc network; IoT applications; Network attacks; Intrusion detection system; INTRUSION-DETECTION SYSTEM; SENSOR NETWORK; CLASSIFICATION ALGORITHMS; ROUTING PROTOCOL; INTERNET; PREVENTION; THINGS; MANETS; MODEL;
D O I
10.1108/IJIUS-05-2021-0028
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Purpose Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router. Design/methodology/approach This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT. Findings It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution. Originality/value This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
引用
收藏
页码:482 / 506
页数:25
相关论文
共 50 条
  • [11] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [12] Security evaluation of a wireless ad-hoc network with dynamic topology
    Kalinin M.O.
    Minin A.A.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 899 - 901
  • [13] A survey on security issues and challenges in mobile Ad-hoc network
    Keerthana G.
    Anandan P.
    2018, European Alliance for Innovation (05)
  • [14] Reliable mobile ad-hoc network
    Dana, Arash
    Zadeh, Ahmad Khadem
    Nasiri, Saeid Haji
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 371 - +
  • [15] Architecture of the Mobile Ad-hoc Network Security (MANS) system
    Manikopoulos, C
    Ling, L
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3122 - 3127
  • [17] Unmasking threats in mobile wireless ad-hoc network settings
    Spiewak, Dagmara
    Engel, Thomas
    Fusenig, Volker
    WSEAS Transactions on Communications, 2007, 6 (01): : 104 - 110
  • [18] Weighted cooperative routing for wireless mobile Ad-hoc network
    ZHAO, Xian-jing
    ZHENG, Bao-yu
    CHEN, Chao
    Journal of China Universities of Posts and Telecommunications, 2007, 14 (01): : 16 - 21
  • [19] Evaluation of mobile ad-hoc network techniques in a cellular network
    Wijting, CS
    Prasad, R
    IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 1025 - 1029
  • [20] An ad-hoc wireless network architecture for face-to-face mobile collaborative applications
    Zurita, G
    Nussbaum, M
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2006, PROCEEDINGS, 2006, 3894 : 42 - 55