115 research outputs found

    Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

    Get PDF
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critica

    IMPLEMENTATION OF MANET CONTROL PACKET DROP USING BAIT DETECTION APPROACH

    Get PDF
    The conception following this development is the communication between nodes with the purpose of nodes cooperating with a piece of other. The expansion of mean nodes can direct to severe security concern; such nodes may interrupt the routing process. In this environment to prevent or detect malicious nodes, an instigation of greenhole or collaborative blackhole attack must be a dispute. This issue attempt to declaration by designing a Dynamic Routing (DR)-based routing technique, which is referred to as the helpful Bait Detection System (BDS) which integrate the compensation of both proactive and reactive security architectures. Our BDS technique equipment and knock over tracing performance helps in achieving the fixed target. Finally, the simulation result are obtained, appearance of the happening of malicious-node attacks, the BDS outperforms the DSR network, and Adhoc On-Demand Distance Vector(AODV) Routing protocols in terms of mounting packet delivery ratio and routing overhead and throughput

    A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs

    Get PDF
    In Mobile Ad-hoc Networks (MANETs), the main problem is the security as well as formation of communication amongst nodes is that nodes must work together with each other. Avoiding or sensing malicious nodes initiation grayhole or collaborative blackhole attacks is the main challenge. Cooperative bait detection approach mixes the advantages of both proactive and reactive defense architectures. Here it uses the technique of transposition for implementing security and the CBDA technique outfits a reverse tracing method to help in attaining the specified aim. The demonstration in the occurrence of malicious-node attacks, the CBDA outperforms the DSR, and Best-Effort Fault-Tolerant Routing (BFTR) protocols in relations to packet delivery ratio and routing overhead. In the transposition method we use the key which is the askey value of the character which is encrypted at sender side and decrypted at receiver. DOI: 10.17762/ijritcc2321-8169.15033

    IMPROVE THE PERFORMANCE OF AODV UNDER BLACKHOLE ATTACK IN MANET

    Get PDF
    The Mobile Ad-hoc Network is an infrastructure-less network in which each mobile node can communicate with other node without any fixed network. In view of this, the networks are vulnerable to various kind of attacks such as black hole attack, gray hole attack etc. The black hole attack is one of the cruel attacks in Mobile Ad-hoc NETwork (MANET). The simulation is carried out using MATLAB and analyzes the black hole attack in Ad-hoc On-demand Distance Vector (AODV) routing protocol and compared the performance of packet delivery ratio and delay with existing algorithm Hash_DSR. The result shows that the Hash_AODV is better than the Hash_DSR

    The Impact of selfishness Attack on Mobile Ad Hoc Network

    Get PDF
    Mobile Ad-Hoc Network (MANET) is an infrastructure-less network that has the ability to configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is selfishness attack. In this type of attack, each node tries to save its resources, behave selfishly or non-cooperatively by not forwarding packets that are generated by other nodes. Routing in MANET is susceptible to selfishness attack and this is a crucial issue which deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of selfishness attack on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Destination Sequenced Distance Vector (DSDV), as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new Selfishness Attack Model (SAM) which applies selfishness attack on the two chosen routing protocols in the NS-2 simulator. According to the conducted simulation results, AODV shows higher performance than DSDV under the effect of selfishness attack

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    Comparative and Analytical Study towards Mitigation of Gray hole Attacks in VANET

    Get PDF
    Vehicular Adhoc Network is a type of (MANET) Mobile Adhoc Network that enables vehicles on the road to intelligently interact and communicate with other vehicle and road side infrastructure unit. It is prone to several type of attacks and one such attack is Grayhole attack. Gray hole attack is one of the attack on routing specification in which malicious node selectively drops packets coming from the source. Due to lack of security in Adhoc on Demand Distance Vector (AODV) routing protocol, Grayhole attack disrupts the performance of network and render communication impossible. This paper reviews various attacks in VANET including Grayhole attack on AODV routing protocol and provides a survey of existing defence approaches to mitigate them
    • …
    corecore