1,556 research outputs found

    Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments

    Get PDF
    This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expiration timer that aim to deal with congestion and quick reputation convergence. We propose to use two different centrality measures for evaluation of the individual trust claims and resolving the aggregated ones. We design and build our prototype over AODV and test it in NS-2 in the presence of variable active blackhole attacks in highly mobile and sparse networks. Our results show that we achieve increased throughput while delay and jitter decrease and converge to AODV

    A survey on mitigation methods to Black hole Attack on AODV routing protocol

    Get PDF
    AODV is a routing protocol that is designed for MANETs and it is using the on-demand routing method to establish the routes between nodes. The main benefit of this protocol is establishment of desired routes to destination when the source node requires and it keeps the routes as long as they are needed. The black hole attack is a common attack that can be accrued in AODV protocols. In this kind of attack, the attacker uses of one or more malicious nodes which advertise themselves in the network by setting a zero metric to all the destinations that causes all the nodes toward the data packets to these malicious nodes. The AODV is vulnerable against black hole attacks due to having network centric property, where all the nodes have to share their routing tables for each other. In this paper, we present the survey of existing mitigation methods that have been proposed to secure AODV. Keywords: Mobile Ad hoc Network (MANET); Black hole attack; Cooperative Black hole attack; Ad-hoc On-demand Distance Vector (AODV)

    A Review on Attacks in Mobile Ad hoc Network (MANET)

    Get PDF
    MANET (Mobile Ad hoc Network) is a wireless network having no any fixed infrastructure. It consists of autonomous, self-organized wireless mobile nodes, which are to move in or out in the network. MANET performs all the network activities such as message delivery, discovery of route path etc. using its nodes only. It uses the routing protocols such as DSDV, DSR and AODV etc. As there is no clear line of defense in MANET, so, it is more prone to both the legitimate users and the malicious nodes . The presence of these malicious nodes is one of the major the challenges in MANET and it has become necessary to design a very robust solution for the security of MANET. MANET is more vulnerable to attacks because of its openness, dynamic and infrastructure-less nature. The two types of routing attacks are , such as active i.e. Gray Hole Attack, Black Hole Attack, Flooding, Spoofing, Wormhole and passive i.e. Eavesdropping, Traffic Analysis. AODV is used to discover the path from source to destination but its more prone to malicious intent like gray hole and black hole attacks. Gray Hole attack tends to drop the packet while the routing process. In Black Hole attack, the malicious node presents itself as the shortest and newest route to the destination node and attracts the routing packets. This paper presents a focus on the fundamental issues in MANET by describing its related research in the previous year along with its concept, features and vulnerabilities

    Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles

    Get PDF
    Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs). Malicious vehicles or nodes may exist in the cyber-physical path on which the data and control packets have to be routed converting a secure and reliable route into a compromised one. However, instead of passing packets to a neighbouring node, malicious nodes bypass them and drop any data packets that could contain emergency alarms. We introduce an intelligent black hole attack detection scheme (IDBA) tailored to ACV. We consider four key parameters in the design of the scheme, namely, Hop Count, Destination Sequence Number, Packet Delivery Ratio (PDR), and End-to-End delay (E2E). We tested the performance of our IDBA against AODV with Black Hole (BAODV), Intrusion Detection System (IdsAODV), and EAODV algorithms. Extensive simulation results show that our IDBA outperforms existing approaches in terms of PDR, E2E, Routing Overhead, Packet Loss Rate, and Throughput

    A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various military, medical, and commercial scenarios. This is due to their dynamic nature that enables the deployment of such networks, in any target environment, without the need for a pre-existing infrastructure. On the other hand, the unique characteristics of MANETs, such as the lack of central networking points, limited wireless range, and constrained resources, have made the quest for securing such networks a challenging task. A large number of studies have focused on intrusion detection systems (IDSs) as a solid line of defense against various attacks targeting the vulnerable nature of MANETs. Since cooperation between nodes is mandatory to detect complex attacks in real time, various solutions have been proposed to provide cooperative IDSs (CIDSs) in efforts to improve detection efficiency. However, all of these solutions suffer from high rates of false alarms, and they violate the constrained-bandwidth nature of MANETs. To overcome these two problems, this research presented a novel CIDS utilizing the concept of social communities and the Dempster-Shafer theory (DST) of evidence. The concept of social communities was intended to establish reliable cooperative detection reporting while consuming minimal bandwidth. On the other hand, DST targeted decreasing false accusations through honoring partial/lack of evidence obtained solely from reliable sources. Experimental evaluation of the proposed CIDS resulted in consistently high detection rates, low false alarms rates, and low bandwidth consumption. The results of this research demonstrated the viability of applying the social communities concept combined with DST in achieving high detection accuracy and minimized bandwidth consumption throughout the detection process

    Treatment of Reactive Routing Protocols Using Second Chance Based on Malicious behavior of Nodes in MANETS

    Get PDF
    Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research focused on the study of the threats, attacks and reasons for malicious behavior of nodes in the network for reactive routing protocols in MANETS. DSR and AODV are the two reactive routing protocols that considered the study to propose a second chance strategy to given to the nodes considering the reason for malicious behavior to improve the packet delivery ratio and reduce the routing overhead in the network. A simulative study has conducted using Ad hoc Simulator (ASIM) considering the DSR and AODV routing protocols in the presence of malicious nodes and in the absence of malicious nodes that showed, that the packet delivery ratio is low and routing overhead is high in the absence of malicious nodes. The second chance strategy proposed considers the reasons for malicious behavior and helps the node to be reintegrate in the network to improve the packet delivery ratio and reduce the routing overhead

    Manifestation and mitigation of node misbehaviour in adhoc networks

    Get PDF
    Mobile adhoc network is signified as a boon for advance and future wireless communication system. Owing to its self-establishing network features and decentralization, the system can actually establish a wireless communication with vast range of connectivity with the other nodes. However, the system of MANET is also beheld with various technical impediments owing to its inherent dynamic topologies. Although there are abundant volume of research work, but very few have been able to effectively address the node misbehavior problems in MANET. The paper initially tries to draw a line between different types of nodes in MANETs based on their behavior characteristics, then reviews some of the significant contribution of the prior researches for addressing node misbehavior issues. A major emphasis is laid on is the researches which use game theory as a tool to study and address the misbehavior problems. The manuscript is developed considering some of the latest and standard evidences of past 5 years and finally discusses the open issues related to the problems
    • โ€ฆ
    corecore