CFP last date
20 January 2025
Reseach Article

Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes

by J.deepa, K.hemapriya, S.kaviarasan
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 18
Year of Publication: 2015
Authors: J.deepa, K.hemapriya, S.kaviarasan
10.5120/19927-2050

J.deepa, K.hemapriya, S.kaviarasan . Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes. International Journal of Computer Applications. 113, 18 ( March 2015), 30-33. DOI=10.5120/19927-2050

@article{ 10.5120/19927-2050,
author = { J.deepa, K.hemapriya, S.kaviarasan },
title = { Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 18 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number18/19927-2050/ },
doi = { 10.5120/19927-2050 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:16.308205+05:30
%A J.deepa
%A K.hemapriya
%A S.kaviarasan
%T Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 18
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node in MANET is able to successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. Here the problem is to identify malicious nodes that launch a pollution attack using SIEVE a decentralized, accurate and robust technique that exploits rateless codes which detect chunk integrity. Source nodes transmit data using Luby Transform codes (a class of rateless codes) and any legitimate node in a WMN executes a randomized and fully distributed detection mechanism to detect its malicious neighbors and it is isolated subsequently. Furthermore, an interesting trade-off between coding efficiency and SIEVE completeness, reactivity and accuracy is discovered. We also show that SIEVE is efficient that requires low memory, computational and communication resources.

References
  1. M. Luby, "LT codes," in Proc. 43rd FOCS, Washington, DC, USA, 2002, pp. 271–280.
  2. Jing Dong, Reza Curtmola and Cristina Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-FlowNetwork Coding for Wireless Mesh Networks," in Proc. ACM Conference on Security in Wireless Mobile Network, Mar. 2009.
  3. ShwetaAgrawal and Dan Boneh, "Homomorphic MACs: MAC- based Integrity for Network Coding," in 7th International Conference on Applied Cryptography and Network Security, June 2009.
  4. A. Rajaram and Dr. S. Palaniswami, "A Trust-Based Cross-Layer Security Protocol for Mobile Ad hoc Networks," in International Journal of Computer Science and Information Security,Vol. 6, No. 1, October 2009.
  5. Xing Jin and S. H. Garychan, "Detecting Malicious Nodes in Peer-to Peer Streaming by Peer Based Monitoring," in ACM Transactions on Multimedia Computing, Communication& Applications, Vol: 6, Issue:2, March 2010.
  6. Qiyan Wang, Long Vu Klara Nahrstedt and Himanshu Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in In Proc. IEEE INFOCOM, August 2010.
  7. Yongkun Li and JohnC. S. Lui, "Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems," in Performance evaluation,Vol: 67, 2010.
  8. Yaserkhamayseh, Ruba Al-Salah and MuneerBani Yassein, "Malicious Nodes Detection in MANETs: Behavioral Analysis Approach," in Journal of Networks, vol:7, No:1, January 2012.
  9. Wu Chi, Huang Cheng and Huang Xiaotao, "A Combination Scheme against Pollution Attacks in Network Coding," in IEEE/ACIS International Conference on Computer and Information Science,2012.
  10. Yongkun Li and John C. S. Lui, "Epidemic Attacks in Network Coding Enabled Wireless Mesh Networks Detection, Identification and Evaluation," in IEEE.
  11. RamandeepKaur and Jaswinder Singh, "Towards Security against Malicious Node Attack in Mobile Ad Hoc Network," in International Journal of Advanced Research in Computer Science and Software Engineering,Volume: 3,Issue: 7, July 2013.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Luby Transform Codes Malicious Node Isolation