Detection and Prevention of Cooperative Attacks on Mobile Ad Hoc Networks
Keywords:
Mobile nodes, Attacks, CBDS, DSR, AODV, Reverse tracing method.Abstract
In Mobile Ad hoc network Preventing or detecting malicious nodes launching Grayhole or collaborative Blackhole attacks is a challenge. In this paper enhanced CBD Scheme is used to detect the worm hole attack and establishes path in between sender and receiver. Dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that combines the advantages of proactive and reactive defense architectures. CBDS method using a reverse tracing technique to achieving the stated goal.
References
- Baadache.A and A. Belmehdi, "Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks," Intl. J. Comput. Sci. Inf. Security, vol. 7, no. 1, 2010
- Chang.C, Y.Wang, and H. Chao, "An efficientMesh-based core multicast routing protocol onMANETs," J. Internet Technol., vol. 8, no. 2, pp. 229 239, Apr. 2007.
- Corson.S and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved March 18, 2013). Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html
- Deng.H, W. Li, and D. Agrawal, "Routing security in wireless ad hoc network," IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
- Johnson.D and D. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Comput., pp. 153 181, 1996.
- Liu.K, D. Pramod, K. Varshney, and K. Balakrishnan, "An Acknowledgement based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536 550, May 2007.
- Marti.S, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255 265.
- Ramaswamy.S, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of cooperative blackhole attacks in wireless ad hoc networks," in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570 575.
- Rubin.I, A. Behzad, R. Zhang, H. Luo, and E. Caballero, "TBONE: A mobile-backbone protocol for ad hoc wireless networks," in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727 2740.
- Tsou.C, J.-M. Chang, H.-C. Chao, and J.-L. Chen, "CBDS: A cooperative bait detection scheme to prevent malicious node forMANET based on hybrid defense architecture," in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28 Mar., 03, 2011, pp. 15
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.