Detection and Prevention of Cooperative Attacks on Mobile Ad Hoc Networks

Authors

  • M. Karmukil  Department of CSE, Park college of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • A. Ramasamy  Department of CSE, Park college of Engineering and Technology, Coimbatore, Tamil Nadu, India
  • S. Padmavathi  Department of CSE, Park college of Engineering and Technology, Coimbatore, Tamil Nadu, India

Keywords:

Mobile nodes, Attacks, CBDS, DSR, AODV, Reverse tracing method.

Abstract

In Mobile Ad hoc network Preventing or detecting malicious nodes launching Grayhole or collaborative Blackhole attacks is a challenge. In this paper enhanced CBD Scheme is used to detect the worm hole attack and establishes path in between sender and receiver. Dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that combines the advantages of proactive and reactive defense architectures. CBDS method using a reverse tracing technique to achieving the stated goal.

References

  1. Baadache.A and A. Belmehdi, "Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks," Intl. J. Comput. Sci. Inf. Security, vol. 7, no. 1, 2010
  2. Chang.C, Y.Wang, and H. Chao, "An efficientMesh-based core multicast routing protocol onMANETs," J. Internet Technol., vol. 8, no. 2, pp. 229 239, Apr. 2007.
  3. Corson.S and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved March 18, 2013). Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html
  4. Deng.H, W. Li, and D. Agrawal, "Routing security in wireless ad hoc network," IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
  5. Johnson.D and D. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Comput., pp. 153 181, 1996.
  6. Liu.K, D. Pramod, K. Varshney, and K. Balakrishnan, "An Acknowledgement based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536 550, May 2007.
  7. Marti.S, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255 265.
  8. Ramaswamy.S, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative blackhole attacks in wireless ad hoc networks," in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570 575.
  9. Rubin.I, A. Behzad, R. Zhang, H. Luo, and E. Caballero, "TBONE: A mobile-backbone protocol for ad hoc wireless networks," in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727 2740.
  10. Tsou.C, J.-M. Chang, H.-C. Chao, and J.-L. Chen, "CBDS: A cooperative bait detection scheme to prevent malicious node forMANET based on hybrid defense architecture," in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28 Mar., 03, 2011, pp. 15

Downloads

Published

2016-06-30

Issue

Section

Research Articles

How to Cite

[1]
M. Karmukil, A. Ramasamy, S. Padmavathi, " Detection and Prevention of Cooperative Attacks on Mobile Ad Hoc Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.812-814, May-June-2016.