Detection and Avoidance of Malicious Nodes in MANETs

Authors

  • Deva Priya M  Department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India
  • Aishwarya R  Department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India
  • Anushya S  Department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India
  • Keerthana S  Department of Computer Science & Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India

Keywords:

Wireless Communication, MANET, CBDS, Black Hole Attack, Grey Hole Attack, Wormhole Attack.

Abstract

In Mobile Ad hoc NETwork (MANET), the primary requirement is co-operative communication among nodes. Malicious nodes in a network may lead to attacks like Black Hole, Grey Hole and Wormhole attacks. In this paper, various routing schemes like Dynamic Static Routing (DSR), 2ACK, Best-Effort Fault-Tolerant Routing (BFTR) are considered and their behaviors against attacks are also examined. To deal with these attacks in these routing schemes, Enhanced Cooperative Bait Detection Scheme (ECBDS) that integrates the advantages of both proactive and reactive defense architecture based on DSR mechanism is designed. A malicious node can attract all packets by using forged Route REPly (RREP) packet to falsely claim fake shortest route to the destination and then discard these packets without forwarding them to the destination. ECBDS rejects the alarmed and detected malicious nodes in the initial stages. It outperforms the existing Cooperative Bait Detection Scheme (CBDS) mechanism in terms of Packet Delivery Ratio (PDR), Throughput and Routing Overhead.

References

  1. Tsou P.et al, CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, February 2007.
  2. Corson S. and Macker J., Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, March 2008.
  3. Chang C., Wang Y. and Chao H., An efficient Mesh-based core multicast routing protocol on MANETs, April 2010.
  4. Johnson D. and Maltz D., Dynamic source routing in ad hoc wireless Networks 2010.
  5. Rubin I., Behzad A. and Caballero E., TBONE: A mobile-backbone protocol for ad hoc wireless networks, March 2011.
  6. Baadache A. and Belmehdi A., Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks, April 2011.
  7. Wankhade V., 2ACK-Scheme: Routing Misbehaviour Detection in MANETs Using OLSR, Vol. No. 1, Issue 5, July 2012.
  8. Yuan Xueand KLARA Nahrstedt, Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments, August 2012.
  9. Shi-Chang L., Hao-Lan Y., & Qing-Sheng Z., Research on MANET security                      architecture design. In International Conference on Signal Acquisition and Processing. ICSAP'10, Vol 1, pp. 90-93, February, 2010.
  10. Chang J. M., Tsou P. C., Chao H. C., & Chen J. L., CBDS: A cooperative bait     detection scheme to prevent malicious node for MANET based on hybrid defense architecture. In 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1-5, February 2011.
  11. Agalya A., Nandini C., & Sridevi S., Detecting and Preventing Black Hole, March 2013.
  12. Attacks In MANETS Using CBDS (Cooperative Bait Detection Scheme), International Journal of Modern Trends in Engineering and Research (IJMTER), Vol. 2, Issue 04, February 2014.
  13. Akinlemi Olushola O., & Babu K.S., Cooperative Bait Detection Scheme (CBDS) To Avoid the Collaborative Attacks of Nodes in MANET, March 2014.
  14. Sharma M., and Chander Prabha C., Byzantine, Attacks in MANET through Enhanced CBDS Technique. American International Journal of Research in Science, Technology, Engineering & Mathematics AIJRSTEM, pp. 14-543, June 2014.
  15. Chang, Jian-Ming, et al. "Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach." IEEE Systems Journal 9.1, pp.65-75, January 2015.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Deva Priya M, Aishwarya R, Anushya S, Keerthana S, " Detection and Avoidance of Malicious Nodes in MANETs, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.434-441, March-April-2017.