Abstract-Mobile Adhoc networks(MANETs) are gaining popularity due its rapid deployment nature and ease to establish without any pre requirements. These are widely used in enormous number of applications especially in military and disaster recovery areas where secured communication is most important. Due to the medium used by it, resource limitation and dynamic topology ,it is more prone to variety of security attacks. Among them the attack by the insider compromised nodes namely byzantine attacks are very hard to predict and more dangerous. It reduces the overall network performance by affecting the trusted routing in various manners. The byzantine nodes drops the packets selectively ,pretend to be an intended intermediate node and so on and thereby challenges the reliability of the network and the participating nodes. This paper tries to discuss the major types of routing protocols ,types of security attacks, byzantine attacks and its types, and analyse the foremost categories of solutions suggested by the researchers to mitigate the byzantine attacks in the field.Keywords-Byzantine attacks, MANETs, reliability, security.
I. INTRODUCTIONIn current scenario wide usage of mobile devices and availability of wireless network services made communication faster and cheaper. These wide ranges of technologies made the current business strategy simpler, though they have also introduced lot of security vulnerabilities. Mobile Adhoc Network (MANET)is a kind of wireless network which is formed arbitrarily by a set of mobile nodes which are within the range of each other without any central administrator. As the network is formed on the fly and there is no authority to monitor and control the activities carried out by the participating nodes, it is more vulnerable to security threats compared to wired networks and wireless networks with access points.Manets are widely used in situations where there is a not possible to have infrastructure network like in tsunami affected areas or setting a network is costlier to serve the required temporary purpose. Minimal configuration, rapid deployment and no need of a central governing authority make ad hoc networks suitable for emergency situations like natural disasters, military conflicts and emergency medical situation. The group of available mobile nodes which are within the range of each other forms a network communicate with each other and uses multihop routing strategy to communicate with the other nodes which are not within their range. Node Mobility which leads to dynamic topology, bandwidth constraints(limited bandwidth),error prone shared channel ,and resource constraints such as battery power of nodes are the major design issues of secured routing protocols in Manets.In Manets secured routing becomes a real challenge since the nodes which are not familiar in past may establish a network without any central administrator. The well known early adhoc network routing protocols like AODV,DSDV establish communication paths by assuming that all participating nodes are trustworthy ...