About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 818054, 6 pages
http://dx.doi.org/10.1155/2012/818054
Review Article

Security Issues in Mobile Ad Hoc Networks

1Grupo de Análisis, Seguridad y Sistemas (GASS), Departamento de Ingeniería del Software e Inteligencia Artificial (DISIA), Facultad de Informática, Universidad Complutense de Madrid (UCM), Despacho 431, Calle Profesor José García Santesmases s/n, Ciudad Universitaria, 28040 Madrid, Spain
2Grupo de Análisis, Seguridad y Sistemas (GASS), Sección Departamental de Sistemas Informáticos y Computación, Lenguajes y Sistemas Informáticos y Ciencias de la Computación e Inteligencia Artificial-Facultad de Ciencias Matemáticas, Universidad Complutense de Madrid (UCM), Despacho 310-F, Plaza de Ciencias, 3, Ciudad Universitaria, 28040 Madrid, Spain
3Grupo de Redes de Computadores e Ingeniería de Software (GRECIS), Departamento de Ingeniería de Sistemas, Universidad del Norte, Km 5 Autopista a Puerto Colombia, Barranquilla, Colombia
4School of Information Science, GVSA and UTAS, 20 Virginia Court, Sandy Bay, Hobart, TAS 7001, Australia

Received 30 September 2012; Accepted 6 October 2012

Academic Editor: Sabah Mohammed

Copyright © 2012 A. L. Sandoval Orozco et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.