CFP last date
20 January 2025
Reseach Article

Providing of Secure Routing against Attacks in MANETs

by A.Vani, D.Sreenivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 8
Year of Publication: 2011
Authors: A.Vani, D.Sreenivasa Rao
10.5120/2972-4003

A.Vani, D.Sreenivasa Rao . Providing of Secure Routing against Attacks in MANETs. International Journal of Computer Applications. 24, 8 ( June 2011), 16-25. DOI=10.5120/2972-4003

@article{ 10.5120/2972-4003,
author = { A.Vani, D.Sreenivasa Rao },
title = { Providing of Secure Routing against Attacks in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 8 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number8/2972-4003/ },
doi = { 10.5120/2972-4003 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:26.268423+05:30
%A A.Vani
%A D.Sreenivasa Rao
%T Providing of Secure Routing against Attacks in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 8
%P 16-25
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A collection of wireless nodes which exchange various information among each other through wireless links as per the coverage boundary, directly or with the support of midway nodes as routers called infrastructure less in ADHOC networks. The Mac 802.11 wireless standard supports multiple data rates at the physical layer. Wireless network is dynamic because of frequent changes take place inside the topology due to mobility or energy loss. Accordingly any node can join or else leave the network in order to that changes in membership causes trust relationship among nodes is a big issue. During this circumstances security is the main concern in AD HOC networks. The existing protocols are inadequate to discover various types of threats. To overcome this problem designing a new routing protocol to provide solution for detecting and preventing nodes from security threats. Our proposed network security protocol includes with Intrusion detection system. It observe the network traffics and trying to investigate the misbehave activities like attackers, wormhole, anomalies, failure, channel blocked success plus other anonymous behavior in network and maintenance. We implement this algorithm using network simulator [ns-2].The performance of the protocol is measured using packet delivery ratio, Avg end- to- end delay, routing overhead and throughput.

References
  1. S. Corson and J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues a evaluation considerations,” RFC 2501,Jan. 1999.
  2. S Buchegger & J-Y Le Boudec, “Nodes Bearing Grudges: Towards Security, Fairness and Robustness in Mobile Ad hoc Networks,” In Proc.10th IEEE Euro micro Workshop on Parallel, Distributed and Network
  3. 3 P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  4. K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007
  5. M. O. Pervaiz, M. Cardei, and J. Wu, "Routing Security in Ad Hoc Wireless Networks," Network Security, S. Huang, D. MacCallum, and D. -Z. Du (eds.), Springer, 2008.Institute of Technology Hoboken, New Jersey, USA, 8th December 2002
  6. S.Marti, T.J.Giuli, K.Lai, M.Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”.
  7. Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wire- less networks,” in Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986, 2003
  8. L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 131-141, 2004
  9. S. Capkun, L. Buttyan, and J. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wire- less networks,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21- 32, 2003
  10. H. S. Chiu and K. S. Lui. Delphi: wormhole detection mechanism for ad hoc wireless networks. 1st International Symposium on Wireless Pervasive Computing, pages 6–11, January 2006.
  11. LathaTamilselvan, Dr.V.Sankarayanan, “Prevention of Black hole Attack in MANET”. The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless2007) India, 2007 IEEE
  12. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto. “Detecting Black hole Attack on AODV based Mobile Ad hoc networks by Dynamic Learning Method”. International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov 2007.
  13. A. Shurman, S. M. Yoo, and S. Park, “Black hole attack in wireless ad hoc networks.” In: Proceedings of the ACM 42nd Southeast Conference (ACMSE’04), pp 96-97, Apr. 2004.
  14. A.D. wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” IEEE October 2002.
  15. L. Buttyan and J. Hubaux, “Stimulating cooperation in self organizing mobile ad hoc networks,” ACM/Kluwer Mobile Networks and Applications (MONET) 8 (2003).
  16. M. Baker, E. Fratkin, D. Guitierrez, T. Li, Y. Liu and V. Vijayaraghavan, “Participation incentives for ad hoc Networks,” http://www.stanford.edu/~yl31/adhoc (2001).
  17. Zhong, J. Chen and Y.R. Yang, “Sprite: A simple, cheatproof, cedit-based system for mobile ad-hoc networks,” Technical Report 1235, Department of Computer Science, Yale University (2002).
  18. D. Barreto, Y. Liu, J. Pan and F. Wang, “Reputation-based Participation enforcement for adhoc networks,”http://www.stanford.edu/~yl314/adhoc (2002).
  19. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” In: Mobile Computing and Networking. (2000) 255–265.
  20. S. Buchegger and J.Y.L Boudec, “Performance Analysis of The CONFIDANT Protocol: Cooperation of Noes —Fairness In Distributed Ad-hoc Networks,” In Proc. Of IEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, IEEE (2002) 226– 236.
  21. P. Michiardi and R. Molva, “Making greed work in mobile Ad hoc networks,” Technical report, Institut Eur´ecom (2002).
  22. I. Aad, J.P, Hubaux, and E.W. Knightly, “Denial of Service Resilience in Ad Hoc Networks”, ACM MOBICOM 2004, Philadelphia, PA, USA.
  23. V. Gupta, S. Krishnamurthy, and M. Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In Proc. of MILCOM, 2002.
  24. M. Just, E. Kranakis, and T. Wan, “Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks”, In Proc. of ADHOCNOW'03, Montreal, Canada.
  25. n et al., “Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks”IEEE JSAC, vol.24, no.2, Feb 2006.
  26. Guerrero Zapata, “Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications “Review, v.6 n3, July 2002
  27. doi>10, 1145/581291.581312
  28. Papadiminitratos and Zygmunt J.Hass,”Secure data Communication in Mobile ad hoc Networks”IEEE JSAC, vol.24, No.2, February 2006.
  29. Papadimiatos and Zygmunt J.Haas and Samar.”The Secure Routing Protocol (SRP) for ad hoc Networks.draft-papadimitratos-secure-routing-protocol”00.txt, Dec.2002
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc network Blackhole DOS Flooding Intruder MIM