Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

被引:13
|
作者
Pamarthi, Satyanarayana [1 ]
Narmadha, R. [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
关键词
Network security; Wireless sensor network; Mobile ad-hoc network; IoT applications; Network attacks; Intrusion detection system; INTRUSION-DETECTION SYSTEM; SENSOR NETWORK; CLASSIFICATION ALGORITHMS; ROUTING PROTOCOL; INTERNET; PREVENTION; THINGS; MANETS; MODEL;
D O I
10.1108/IJIUS-05-2021-0028
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Purpose Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router. Design/methodology/approach This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT. Findings It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution. Originality/value This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
引用
收藏
页码:482 / 506
页数:25
相关论文
共 50 条
  • [21] Replication in Mobile Ad-hoc Network Using Hopfield Network
    Chawla, Tanu
    Kumar, Dr. Mukesh
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 26 - 31
  • [22] Towards middleware services for mobile ad-hoc network applications
    Plagemann, T
    Goebel, V
    Griwodz, C
    Halvorsen, P
    NINTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 249 - 255
  • [23] Cost Performance Analysis of Intrusion Detection System in Mobile Wireless Ad-Hoc Network
    Pinnaka, Anil Kumar
    Tharashasank, D.
    Reddy, V. S. K.
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 536 - 541
  • [24] Efficient Malicious Detection for AODV in Mobile Ad-hoc Network
    Amaresh, M.
    Scholar, P. G.
    Usha, G.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 263 - 269
  • [25] Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network
    Singh, Bharat
    Bansal, Akash
    Kumar, Sunil
    Garg, Anshu
    CONTEMPORARY COMPUTING, PT 2, 2010, 95 : 205 - +
  • [26] An analytical model for differentiated services in wireless mobile ad-hoc network
    Tan, E
    McLaughlin, S
    Laurenson, DI
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2754 - 2758
  • [27] Communication-aware mobile hosts in ad-hoc wireless network
    Paul, K
    Bandyopadhyay, S
    Mukherjee, A
    Saha, D
    1999 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 1999, : 83 - 87
  • [28] Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols
    Kumar, Arun B. R.
    Reddy, Lokanatha C.
    Hiremath, Prakash S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 337 - 343
  • [29] A Research to Ad-hoc and Wireless Sensor Network
    Wu, Yuan
    Chen, Xiaochun
    Tian, Zhouhe
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 671 - +
  • [30] On network coding in wireless ad-hoc networks
    Zhang, Jingyao
    Fan, Pingyi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 140 - 148