Eliminating Selective Dropping Attack in Mobile Ad Hoc Network

نویسندگان

چکیده

In this paper, we propose a new reputation approach, called I-WD (improved WatchDog). We attempt to eliminate selective dropping attack that ensue when malicious nodes drop packets at low rates damage the network without been detected. The proposed approach is structured around four modules. monitoring module overhears forwarding activities of neighboring using promiscuous mode. evaluates values. have method enables evaluate their neighbors in multiple sessions. Thus, computed value used determine increment and decrement rate. exclusion accountable for excluding with values below threshold. route selection make restriction about discovered routes. Only routes satisfy incorporation threshold are accepted. simulation results demonstrate improves success rate reduces number dropped by nodes, while increases end-to-end delay.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scattered Dropping Attack on TCP-Based Mobile Ad-Hoc Networks

Scattered Dropping Attack (SDA) is a simple yet very powerful denial of service (DoS) attack that is effective on both TCP and UDP based MANETs. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. It has also been observed that even though the TCP congestion control is adaptable to the packet losses but in cas...

متن کامل

Wormhole Attack in Mobile Ad-hoc Network: A Survey

Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack, its classification and the modes by which they are launched. This paper sum...

متن کامل

Detecting Packet-dropping faults in Mobile ad-hoc networks

Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the “Detection Manager” to locate malicious or faulty nodes that m...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2021

ISSN: ['1572-834X', '0929-6212']

DOI: https://doi.org/10.1007/s11277-021-09289-z