Open Access Open Access  Restricted Access Subscription or Fee Access

Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks

C. Sangami, T.V. Ananthan, S. Shruthi

Abstract


In MANET all nodes are infrastructureless and self configured. There is no separate router used in the network and each node in the network performs the functions of the router. The security in the MANET is very less. The network needs the cooperation of all nodes for routing the packets. But some nodes may not cooperate and hence exploit the routing process.A malicious sends false route reply to the source stating that it has the shortest path to the destination and hence drop all the packets.Using Dynamic Source Routing a detection scheme called Cooperative Bait Detection Scheme is used to detect the malicious nodes. It aims at detecting and preventing malicious nodes from performing gray hole/collaborative black hole attacks. This method uses adjacent node’s cooperation to trap the malicious nodes in MANET. Then isolating the malicious nodes from performing black hole/grey hole attack.


Keywords


Black Hole, Collaborative Black Hole Attack, Cooperative Bait Detection Approach (CBDA), Grey Hole, Malicious Node.

Full Text:

PDF

References


Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, (2014)’Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach’, Member IEEE.

S. Corson and J. Macker,(2013), ‘Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations’, RFC 2501

D. Johnson and D. Maltz,(2012) ‘Dynamic source routing in ad hoc wireless networks’, Mobile Computing., pp. 153–181

Yih-Chun Hu, Adrian Perrig, David B. Johnson, (2013),’ Packet Leashes: A Defense against Worm hole Attacks in Wireless Networks’, Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp. 1976-1986.

K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, (2007), ‘An Acknowledgement based approach for the detection of routing misbehavior in MANETs’, IEEE Trans. Mobile Computing., vol. 6, no. 5, pp. 536–550.

King Sun Chan1 and Mohammad Rafiqul Alam”(2011),’TCBWD: Topological Comparison-based Byzantine Wormhole Detection for MANET’, IEEE International Conference on Wireless and Mobile Computing Y.

C. Hongsong, J. Zhenzhou, and H. Mingzeng,(2006),’A novel security agent scheme for aodv routing protocol based on thread state transition’, Asia Journal of Information Technology, vol. 5, no. 1, pp. 54–60.

Vishnu K and Amos J Paul.(2010), ‘Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks’.

V. Mahajan, M. Natu, A. Sethi,(2008),’Analysis of worm hole intrusion attacks in MANETS’, IEEE Military Communications Conference (MILCOM), pp. 1-7.

L. Lazos, R. Poovendram, C. Meadows, P. Syverson, L.W. Chang,(2005),’ Preventing Worm hole Attacks on Wireless Ad Hoc Networks: a Graph Theoretical Approach’, IEEE Communication Society, WCNC.

A. Baadache, and A.Belmehdi, (2010), ‘Avoiding Black hole and Cooperative Black hole Attacks in Wireless Ad hoc Networks,’ International Journal of Computer Science and Information Security," Vol. 7, No. 1

V. K and A. J PAUL,(2010) ‘Detection and Removal of Cooperative Black/Gray hole attack in Mobile Ad Hoc Networks,’ 2010 International Journal of Computer Applications, Vol. 1, No.22.

Yang H., Luo H., Ye F., Lu S. and Zhang L,(2004), ‘Security in mobile ad hoc networks: challenges and solutions’, In IEEE Wireless Communications, vol. 11, no. 1, pp.38–47.

Maha Abdelhaq1, Sami Serhan2, Raed Alsaqour3 and Rosilah Hassan, 9(2011),A ‘Local Intrusion Detection Routing Security over MANET Network’ 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia.

Nidhi Purohit, Richa Sinha and Khushbu Maurya” (2011), ‘Simulation study of Black hole and Jellyfish attack on MANE using NS3’,INSTITUTE OF TECHNOLOGY, NIRMA UNIVERSITY, AHMEDABAD – 382 481, 08- 10 DECEMBER, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.