4.5 Article

Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation

Journal

SYMMETRY-BASEL
Volume 14, Issue 8, Pages -

Publisher

MDPI
DOI: 10.3390/sym14081543

Keywords

mobile ad hoc network (MANET); Man-In-The-Middle (MITM) attack; security issue; message delayed; message dropped

Funding

  1. Universiti Sains Malaysia [311/PNAV/4119101]

Ask authors/readers for more resources

Mobile ad hoc networks (MANETs) have been widely used in various fields, but the inter-node communication is vulnerable to security attacks, such as Man-In-The-Middle (MITM) attacks. This study aims to investigate the impact of attackers' strategies on executing MITM assaults in MANETs and proposes the use of encryption to prevent such attacks.
Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, and in Internet of Things (IoT) ecosystems. They are also anticipated to play an increasingly significant role in the future of the Internet due to the strong evolution of wireless technology in recent years. Nevertheless, this inter-node communication is vulnerable to various security attacks such as Man-In-The-Middle (MITM) attacks, which are considered to be the main challenge in MANETs. This happens when a harmful node intercepts data shared by legal nodes. Therefore, the main goal of this work is to investigate the impact of attackers' strategies to execute MITM assaults in MANETs, such as message-delayed and message-dropped assaults. The output of this work shows that these assaults have a severe impact on legal entities in MANETs as the network experiences a high number of compromised messages as well as high E2ED and PLD. Finally, by using symmetry or asymmetry cryptographies, our proposal will avoid MITM attacks that intercept the communication between legal nodes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available