40 research outputs found
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for
MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure
and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes
will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the
2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse
effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In
order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme.
Analytical and simulation results are presented to evaluate the performance of the proposed scheme
Identification of Malicious Node for Effective Top-k Query Processing in MANETS
In Mobile Ad-hoc networks, query processing is optimized using Top-k query processing. The accuracy of the results can be lowered if there exists malicious node. In our proposed system, we assume that malicious node perform Data Replacement Attack, in which the malicious node replaces necessary data sets with the false data sets. In our system malicious node identification method, the query issuing node receives the reply messages from the nodes; if a query-issuing node detects a DRA then it performs subsequent inquiries with the nodes which receive the information from the malicious node. In this way the query issuing node identifies the malicious node, and shares the information with the neighbouring nodes. Then the nodes share the information regarding the malicious node with the other nodes which are far away. Each node tends to identify the malicious node in the network, and then floods the information. Query issuing node performs grouping of the nodes based on the similarity of the information on malicious node detected by the nodes. Identification of malicious node is performed based on the results of malicious node identifications by these groups
Sector Routing Protocol (SRP) in Ad-hoc Networks
Routing protocols for wireless ad-hoc networks face the challenge of dynamic topology due to node mobility, limited channel bandwidth and low transmission power. Both proactive and reactive protocols have trade-off in them. Proactive protocols have large overhead and less latency while reactive protocols have less overhead and more latency. The ZRP is a hybrid protocol that overcomes the shortcomings of both proactive and reactive routing protocol. ZRP divides the entire network into overlapping zones of variable size where routing inside the zone is performed using proactive approach and outside the zone is performed using reactive approach. Keywords: Ad-hoc Networks, Routing, Reactive, Proactive, ZRP
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer
Security in any of the networks became an important issue in this paper we
have implemented a security mechanism on Medium Access Control layer by Assured
Neighbor based Security Protocol to provide authentication and confidentiality
of packets along with High speed transmission for Ad hoc networks. Here we have
divided the protocol into two different parts. The first part deals with
Routing layer information; in this part we have tried to implement a possible
strategy for detecting and isolating the malicious nodes. A trust counter for
each node is determined which can be actively increased and decreased depending
upon the trust value for the purpose of forwarding the packets from source node
to destination node with the help of intermediate nodes. A threshold level is
also predetermined to detect the malicious nodes. If the value of the node in
trust counter is less than the threshold value then the node is denoted
'malicious'. The second part of our protocol deals with the security in the
link layer. For this security reason we have used CTR (Counter) approach for
authentication and encryption. We have simulated all our strategies and schemes
in NS-2, the result of which gives a conclusion that our proposed protocol i.e.
Assured Neighbor based Security Protocol can perform high packet delivery
against various intruders and also packet delivery ratio against mobility with
low delays and low overheads.Comment: 11 pages, 6 figures, accepted and cited in "First International
Conference on Computer Science, Engineering and Applications (CCSEA-2011)
A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs
In Mobile Ad-hoc Networks (MANETs), the main problem is the security as well as formation of communication amongst nodes is that nodes must work together with each other. Avoiding or sensing malicious nodes initiation grayhole or collaborative blackhole attacks is the main challenge. Cooperative bait detection approach mixes the advantages of both proactive and reactive defense architectures. Here it uses the technique of transposition for implementing security and the CBDA technique outfits a reverse tracing method to help in attaining the specified aim. The demonstration in the occurrence of malicious-node attacks, the CBDA outperforms the DSR, and Best-Effort Fault-Tolerant Routing (BFTR) protocols in relations to packet delivery ratio and routing overhead. In the transposition method we use the key which is the askey value of the character which is encrypted at sender side and decrypted at receiver.
DOI: 10.17762/ijritcc2321-8169.15033
A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks
In mobile ad hoc networks, by attacking the corresponding routing protocol,
an attacker can easily disturb the operations of the network. For ad hoc
networks, till now many secured routing protocols have been proposed which
contains some disadvantages. Therefore security in ad hoc networks is a
controversial area till now. In this paper, we proposed a Lightweight and
Attack Resistant Authenticated Routing Protocol (LARARP) for mobile ad hoc
networks. For the route discovery attacks in MANET routing protocols, our
protocol gives an effective security. It supports the node to drop the invalid
packets earlier by detecting the malicious nodes quickly by verifying the
digital signatures of all the intermediate nodes. It punishes the misbehaving
nodes by decrementing a credit counter and rewards the well behaving nodes by
incrementing the credit counter. Thus it prevents uncompromised nodes from
attacking the routes with malicious or compromised nodes. It is also used to
prevent the denial-of-service (DoS) attacks. The efficiency and effectiveness
of LARARP are verified through the detailed simulation studies.Comment: 14 Pages, IJWM
Misbehavior Detection in the Internet of Things: A Network-Coding-aware Statistical Approach
In the Internet of Things (IoT) context, the massive proliferation of wireless devices implies dense networks that require cooperation for the multihop transmission of the sensor data to central units. The altruistic user behavior and the isolation of malicious users are fundamental requirements for the proper operation of any cooperative network. However, the introduction of new communication techniques that improve the cooperative performance (e.g., network coding) hinders the application of traditional schemes on malicious users detection, which are mainly based on packet overhearing. In this paper, we introduce a non-parametric statistical approach, based on the Kruskal-Wallis method, for the detection of user misbehavior in network coding scenarios. The proposed method is shown to effectively handle attacks in the network, even when malicious users adopt a smart probabilistic misbehavior
Migrating Packet Dropping in Mobile Ad-hoc Network Based on Modified ACK-Based Scheme
Dynamic topology and infrastructure less behavior provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security threats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme, reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security
“Reducing Packet Loss in MANET”
Dynamic topology and infrastructure less behaviour provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security therats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme,reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords- mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security