An Enhanced Bait Approach to Defend against Collaborative Attacks in Manets
نویسندگان
چکیده
R.SOMASUNDARAM, DR.P.SIVAKUMAR AND K.SUMITHRA M.Tech Student., Department of Computer Science and Engineering, Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India. [email protected]. 2 Associate Professor, Department of Information Technology, Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India. --------------------------------------------------------------------------------------------------------------ABSTRACT The dynamic changing topology of Mobile Ad-hoc Network (MANET) makes a node to join and leave the network at any time. The routes between the nodes in the network are established using routing protocols in MANET. The routing protocols are vulnerable to many kinds of security attacks such as blackhole and grayhole attacks. The Black hole attack is a type of attack where a malicious node advertises itself as if it is having the optimal and shortest route to the destination. To resolve these attack issues a mechanism is proposed which is an Enhanced Bait Detection Approach. The proposed scheme embeds the feature of Dynamic Source Routing (DSR) protocol in Ad-hoc On Demand Distance-Vector Routing (AODV) protocol. The scheme comprises of three steps the bait step, Dubious path detection and the Confirmation request and RREP. The bait approach attracts the malicious node to send a reply and in the next step detects the suspected path. The last step involves the destination requesting its neighbor to confirm if the path given is secure. The work is implemented in Network Simulator. Simulation results for performance metric such as Packet Delivery Fraction, Throughput and Overhead are provided. Index Terms — Blackhole, Bait, DSR, AODV --------------------------------------------------------------------------------------------------------------
منابع مشابه
Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks
Preventing Collaborative Wormhole Attacks on AODV-Based Mobile Ad Hoc Networks c ©Vincent Koo, 2012 Master of Science Computer Science Ryerson University Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly...
متن کاملDefending against Collaborative Packet Drop Attacks on MANETs
Detecting packet drop attacks is important for security of MANETs and current random audit based mechanism cannot detect collaborative attacks. In this paper, we design a hash function based method to generate node behavioral proofs that contain information from both data traffic and forwarding paths. The new method is robust against collaborative attacks described in the paper and it introduce...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملEMLTrust: An enhanced Machine Learning based Reputation System for MANETs
Manymission critical networks includingMANETs formilitary communications and disaster relief communications rely on node cooperation. If malicious nodes gain access to such networks they can easily launch attacks, such as spreading viruses or spam, or attacking known vulnerabilities. One way to defend against malicious nodes is to use Reputation Systems (RS) that try to predict future behavior ...
متن کاملBeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015