IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1623216                                                     

Detection and Prevention of Cooperative Attacks on Mobile Ad Hoc Networks


M. Karmukil, A. Ramasamy, S. Padmavathi
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
In Mobile Ad hoc network Preventing or detecting malicious nodes launching Grayhole or collaborative Blackhole attacks is a challenge. In this paper enhanced CBD Scheme is used to detect the worm hole attack and establishes path in between sender and receiver. Dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that combines the advantages of proactive and reactive defense architectures. CBDS method using a reverse tracing technique to achieving the stated goal.

M. Karmukil, A. Ramasamy, S. Padmavathi

Mobile nodes, Attacks, CBDS, DSR, AODV, Reverse tracing method.

  1. Baadache.A and A. Belmehdi, "Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks," Intl. J. Comput. Sci. Inf. Security, vol. 7, no. 1, 2010
  2. Chang.C, Y.Wang, and H. Chao, "An efficientMesh-based core multicast routing protocol onMANETs," J. Internet Technol., vol. 8, no. 2, pp. 229 239, Apr. 2007.
  3. Corson.S and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved March 18, 2013). Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html
  4. Deng.H, W. Li, and D. Agrawal, "Routing security in wireless ad hoc network," IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
  5. Johnson.D and D. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Comput., pp. 153 181, 1996.
  6. Liu.K, D. Pramod, K. Varshney, and K. Balakrishnan, "An Acknowledgement based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536 550, May 2007.
  7. Marti.S, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255 265.
  8. Ramaswamy.S, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative blackhole attacks in wireless ad hoc networks," in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570 575.
  9. Rubin.I, A. Behzad, R. Zhang, H. Luo, and E. Caballero, "TBONE: A mobile-backbone protocol for ad hoc wireless networks," in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727 2740.
  10. Tsou.C, J.-M. Chang, H.-C. Chao, and J.-L. Chen, "CBDS: A cooperative bait detection scheme to prevent malicious node forMANET based on hybrid defense architecture," in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28 Mar., 03, 2011, pp. 15

Publication Details

Published in : Volume 2 | Issue 3 | May-June - 2016
Date of Publication Print ISSN Online ISSN
2016-06-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
812-814 IJSRSET1623216   Technoscience Academy

Cite This Article

M. Karmukil, A. Ramasamy, S. Padmavathi, "Detection and Prevention of Cooperative Attacks on Mobile Ad Hoc Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.812-814, May-June-2016.
URL : http://ijsrset.com/IJSRSET1623216.php