Open Access Open Access  Restricted Access Subscription or Fee Access

Defense against Collaborative attacks in MANET

K. Saroja, S. Ananthakumaran, P. Ramkumar

Abstract


In MANET, the nodes are more vulnerable to be attacked than wired network due to its dynamic network infrastructure. These vulnerabilities are the nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been planned to exploit these vulnerabilities and disable the MANET operation by compromising the security criteria of the network can be termed as intrusion. While a system that attempts to detect such malicious action of network or compromised nodes is called Intrusion Detection System. The nodes are monitored using IDS, if any abnormal activities are occurred, and then it can able to detect different types of attack based on rule based classification. The SVM is also used to detect the attack accurately but it can be able to detect only the normal and abnormal behaviour. An Attacker can be able to affect on all the layers particularly network and MAC layer, so the attacks in the corresponding layer can be detected by using cross layer mechanism.

Keywords


AODV, Black Hole Attack, Worm Hole Attack, IDS, Cross Layer

Full Text:

PDF

References


Fei Shi, Weijie Liu, Dongxu Jin, Jooseok Song (2013) „A cluster based countermeasure against black hole attacks in MANETs‟ Springer Telecommunication System. Vol.9, No.4, pp. 9788-793.

Fei Shi, Weijie Liu, Dongxu Jin, Jooseok Song (2013) „A countermeasure against worm hole attacks in MANETs using analytical hierarchy process‟ Springer electronic commerce Vol.3, No.8, pp.9122-9130.

Ming-Yang Su (2011) „Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems‟ ElsevierComputer Communications Vol.8, No.4, pp. 107–117.

Mohanapriya. M, Ilango Krishnamurthi (2013) ‟Modified DSR protocol for detection and removal of selective black hole attack in MANET‟ Elsevier Computers and Electrical Engineering Vol.7, No.5, pp. 173-185.

Ming-Yang Su (2010) „WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks‟ Elsevier computers and security Vol.9,No.5, pp. 208 – 224.

Sundararajan. T. V. P. ,Ramesh. S. M. Maheswar. R, Deepak. K. R (2013) „Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANETs‟ Springer Wireless Network Vol.1, No.6, pp.889-894.

Ziming Zhao, Hongxin Hu, Gail-joon Ahn, Ruoyu Wu (2012) „Risk-Aware Mitigation for MANET Routing Attacks‟ IEEE transactions on Dependable and secure computing, Vol.9, No.2, pp.250-261.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.