Mobile Ad-hoc network is instant ,autonomous and easily assembled in havoc terrain, where pre-deployment of infrastructure is impossible. On other hand, it is sometimes notorious because of its unique characteristics such as imprudent topology, promiscuous mode, frequent link breakage and resource constraints. There is extraordinary gap between MANET's nature and security in applications. Secure routing in MANET becomes excellent topic now a day. If security not properly impose consequences will be resource consumption and degradation of network performance. This paper gives survey on secure routing protocols for MANET.
14
Attacks on MANET MANET is suffering from various attacks such as active attacks and passive attacks.[2]Passive Attacks Passive attacks are difficult to detect because they does not disrupt routine operations of network. passive attackers only monitor data traffic and snoop the data without modifying. Here Confidentiality to data is violated. There are some passive attacks. Traffic Monitoring: There are so many networks like satellite, WLAN and cellular are also suffering from such attacks. By monitoring data traffic attackers capture sensitive information for its personnel use. Eavesdropping: malicious node can overhear the data transmission. Transmitted message can be eavesdropped and fraud message can be injected into network. Traffic Analysis: Traffic analysis is a passive attack used to gain information on which nodes communicate with each other and how much data is processed. Syn flooding: By sending repeatedly RREQ, it floods network and make unavailability of resources such as bandwidth, memory and energy.
Active attacksActive attacks are easy to detect than prevent. Active attacks disturb whole network routine. passive attacks are difficult to detect because it does not disturb network routine. Active attacks can be imposed by internal attackers or external attackers.