I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible
DECLARATION
I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University
Signed __________________ Date _________________
ABSTRACT
The Mobile Ad Hoc Network is one of the wireless networks that have attracted the attention of computing professionals, as well as researchers. A Mobile Ad Hoc Network (MANET) can be defined as a system that consists of wireless mobile nodes. The wireless nodes are organized in an arbitraries and topologies. The networks allow individuals to connect without a communication infrastructure. In MANET, nodes can be connected directly with other nodes within radio ranges.Ad hoc networks are referred to as a group of mobile wireless nodes that come together to form an impermanent network without the aid of any centralized monitoring or administrator. It is difficult to maintain the security of Mobile Ad Hoc Networks because of the vulnerabilities associated with these networks. The vulnerabilities of Ad Hoc Mobile Networks are more than those of wired networks. This paper involves a discussion of the security issues and possible solutions in the mobile ad hoc network. The important characteristics of Mobile Ad Hoc Networks (MANET) include self-organisation and wireless medium. This study focuses on finding the differenty types of security threats in mobile ad hoc networks.
Table of Contents
ACKNOWLEDGMENTII
DECLARATIONIII
ABSTRACTIV
CHAPTER 1: INTRODUCTION1
Summary of the Chapter1
Background of the Study1
Aim of the project2
Objectives of the Project2
Legal and Ethical Concerns3
Legal Concern3
Intellectual Property3
Use of Project Documentation3
Development tool /Devices Used3
Ethical Concern4
Public4
Employer and Client4
Product5
Judgement5
Management5
Risk Management5
Thesis Structure6
CHAPTER 2: LITERATURE REVIEW7
Summary of the Previous Chapter7
Literature Review7
Features of Mobile Ad Hoc Network8
Vulnerabilities of the Mobile Ad Hoc Networks9
Lack of Secure Boundaries9
Threats from Compromised Nodes inside the Network10
Lack of Centralised Management Facility10
Restricted Power Supply11
Scalability11
Security Problems in MANET12
Data Corruption12
Session Hijacking12
Black Hole13
Location Disclosure13
Eavesdropping13
Byzantine Attack14
Types of Attacks in Mobile Ad Hoc Networks14
External Attacks14
Internal Attacks14
Denial of Service (DoS)15
Impersonation15
Eavesdropping16
Attacks against Routing16
Security Goals in MANET16
Availability17
Confidentiality17
Integrity17
Authentication17
Security Schemes in the Mobile Ad Hoc Networks18
Intrusion Detection Technique18
Cluster-based Intrusion Detection Technique for Ad Hoc Networks19
Projected Solutions to MANET Security Problems21
CHAPTER 3 : MANET22
Summary of the Previous Chapter22
Detailed discussion of MANET features22
Device Compatibility22
Connectivity23
Routing23
Mobility26
Bandwidth usage26
Survivability27
Security27
Real-world components of a mobile adhoc network29
Network Access Control31
Trace back31
Power Efficiency of the MANETs Security Framework33