Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS
G. S. Mamatha, S. C. Sharma
Pages - 275 - 284 | Revised - 30-06-2010 | Published - 10-08-2010
MORE INFORMATION
KEYWORDS
MANET, Robust, malicious nodes, semantic security
ABSTRACT
A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a mobile ad hoc network (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers. The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing attacks. Several countermeasures have been proposed for these routing attacks in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the different MANET constraints and also is robust in nature, since it is able to identify and prevent four routing attacks parallelly. The experimental analysis shows the identification and prevention of the four attacks parallelly I.e., packet dropping, message tampering, black hole attack and gray hole attack
1 | Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5). |
2 | Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18. |
3 | Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs. |
4 | Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks. |
5 | Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks. |
6 | Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks. |
7 | Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
8 | Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET. |
9 | Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume. |
10 | Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1). |
11 | Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA). |
12 | Tiwari, A., & Verma, N. A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED. |
13 | Kartheesn, L., & Srivatsa, S. K. (2012). A policy based scheme for combined data security in mobile ad hoc networks. Journal of Computer Science, 8(8), 1397. |
14 | Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012, December). Comprehensive study of various DoS attacks and defense approaches in MANETs. In Emerging Trends in Science, Engineering and Technology (INCOSET), 2012 International Conference on (pp. 25-31). IEEE. |
15 | Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In Advances in Communication, Network, and Computing (pp. 60-67). Springer Berlin Heidelberg. |
16 | Shin, S. Y., & Halim, E. H. (2012, October). Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In ICT Convergence (ICTC), 2012 International Conference on (pp. 781-786). IEEE. |
17 | Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1-12. |
18 | Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). A novel approach for grayhole and blackhole attacks in mobile ad hoc networks. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 556-560). IEEE. |
19 | Aarti, P. R. Nav view search. |
20 | Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE. |
21 | Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET). |
Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika. "Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks", In Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447-450, 2009 | |
Bingwen He, Joakim Hägglund and Qing Gu. “Security in Adhoc Networks”, An essay produced for the course Secure Computer Systems HT2005 (1DT658), 2005 | |
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang and Mei-Chun Chou. “Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks”, In Proceedings of 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008, AINAW March 2008 | |
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal and Ajith Abraham. “A Distributed Security Scheme for Ad Hoc Networks”, ACM Publications, Vol-11, Issue 1, pp.5–5, 2004 | |
Frank Kargl, Andreas Klenk, Stefan Schlott and Michael Weber. “Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks”, In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, 2002 | |
H. Deng, W. Li and D. P. Agrawal. “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, 40(10):70-75, October 2002 | |
IEEE Std. 802.11. “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, 1997 | |
IEEE Std. 802.11i/D30. “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security”, 2002 | |
Malcolm Parsons, Peter Ebinger. “Performance Evaluation of the Impact of AttacksOn Mobile Ad hoc Networks”, In Proceedings of Field Failure Data Analysis Workshop | |
Moumita Deb, “A Cooperative Black hole Node Detection Mechanism for ADHOC Networks”, Proceedings of the World Congress on Engineering and Computer Science, 2008 | |
Murali Kodialam, T. V. Lakshman. “Detecting Network Intrusions via Sampling: A Game Theoretic Approach”, In Proceedings of IEEE INFOCOM, 2003 | |
N. Song, L. Qian and X. Li. “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach”, In proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, 2005 | |
Nasser, N, Yunfeng Chen. “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks”, In proceedings of IEEE International Conference on Communications, ICC apos; Vol-07 , Issue 24-28, pp.1154 – 1159, June 2007 | |
Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”. Journal of Internet Engineering, 2:1, 2008 | |
Patcha, A; Mishra, A. “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, In Proceedings of Radio and Wireless conference, RAWCON apos; 03, Vol. 10, Issue 13, pp. 75–78, Aug 2003 | |
Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, 2:54-59, 2009 | |
Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Attacks in Mobile Ad hoc Networks”. International Journal of Computer Science and Security, 2(3):18-29, 2008 | |
S. Yi, P. Naldurg and R. Kravets. “Security-Aware Ad Hoc Routing for Wireless Networks”, In Proceedings of ACM MOBIHOC 2001, pp.299-302, October 2001 | |
S.Dhanalakshmi, Dr.M.Rajaram. “A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”, IJCSNS International Journal of Computer Science and Network Security, 8(10), October 2008 | |
Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah. “A Survey on MANET Intrusion Detection”. International Journal of Computer Science and Security, 2(1):1-11, 1999 | |
Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung. “WAP: Wormhole Attack Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008 | |
T.V.P.Sundararajan, Dr.A.Shanmugam. “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security, 3(2):62-75, April 2009 | |
Yi, Ping Wu, Yue Li and Jianhua. “Malicious node detection in Ad Hoc networks using timed automata”, In Proceedings of IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07), Shangai, China, 2007 | |
Mr. G. S. Mamatha
R.V. College of Engineering - India
mamatha.niranjan@gmail.com
Dr. S. C. Sharma
- India
|
|
|
|
View all special issues >> | |
|
|