We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol

by Thamil Selvi C.p
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 17
Year of Publication: 2012
Authors: Thamil Selvi C.p
10.5120/6998-9118

Thamil Selvi C.p . A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol. International Journal of Computer Applications. 45, 17 ( May 2012), 1-4. DOI=10.5120/6998-9118

@article{ 10.5120/6998-9118,
author = { Thamil Selvi C.p },
title = { A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 17 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number17/6998-9118/ },
doi = { 10.5120/6998-9118 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:37:49.020129+05:30
%A Thamil Selvi C.p
%T A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 17
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is highly essential to ensure security for data transmission. Number of such work is going on to ensure secure data transmission. Due to the high growth usage of mobile in this era, it is highly essential to make use of secure mechanism in mobile. Besides the advent growth of mobile there is also a parallel growth of threats. In order to provide better performance in the mobile architecture this work ensures security for mobile nodes. Every Mobile node is liable to attack. Such nodes were declared as malicious node. This work will provide efficient strategy to fight against threats like Black hole attack using the fitness function generated from ACO (Ant Colony Optimization). Further it stops the fake route display generated from the malicious node which further declared as malicious node. Extent of this work will be DDOS (Distributed Denial of Service) for transmission of packets between mobile nodes.

References
  1. A. tiranuch, and W. Jie ," A survey on Intrusion Detection in Mobile Ad hoc Networks", Chapter 7, Wireless/Mobile Networks Security, Springer, 2006.
  2. Chong Eik Loo, Mun Young Ng, Christopher Leckie, Marimuthu Palaniswami. "Intrusion Detection for routing attacks in Sensor networks" International Journal of Distributed Sensor Networks, 2006.
  3. Bo Yu, Bin Xiao "Detecting Selective Forwarding Attacks in Wireless Sensor Networks" Greece: IPDPS, 2006 .
  4. Bharat Bhargav, Weichao Wang "Visualization of Wormholes in Sensor Networks. New York , NY, USA: ACM press , 2004.
  5. Sumit Gupta, "Anomaly Detection in Wireless Sensor Networks ", MS Thesis, University of Houstan.
  6. J. Bruten, O. Holland and R. Schoonderwoerd, "Ant-like agents for load balancing in telecommunications networks" Agents'97 Marina del Rey CA USA, 1997.
  7. Heng Chen, Depei Qian, Weiguo Wu, Lu Cheng, "Swarm Intelligence Based Energy Balance Routing for Wireless Sensor Networks" iita, Second International Symposium on Intelligent Information Technology Application. , 2008
  8. L. Osadciw,R. . Muraleedharan,"Jamming Attack Detection and countermeasures In Wireless Sensor Network Using Ant System" SPIE Defence and Security, Orlando, 2006.
  9. L. Osadciw ,R. . Muraleedharan and, "Cross Layer Denial of Service Attacks in Wireless Sensor Network Using Swarm Intelligence" IEEE, 2006.
  10. L. Osadciw ,R. . Muraleedharan," Decision Making in a Building access system Using Swarm intelligence and Posets" 38th Annual Conference on Information Sciences and Systems, Princeton University, 2004.
  11. Rajani Muraleedharan and Lisa Osadciw, "Sensor Communication Networks Using Swarm Intelligence", IEEE Upstate New York.
  12. Ioanna Stamouli, "Real-time Intrusion Detection for Ad hoc Networks" Master's thesis, University of Dublin, Septermber 2003.
  13. Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Adhoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  14. Y. -C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks," Proc. 8th ACM Int'l. Conf. Mobile Computing and Networking (Mobicom'02), Atlanta, Georgia, September 2002, pp. 12-23.
  15. Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, "A secure Routing Protocol for Ad hoc networks In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP' 02), 2002
  16. S. Yi, P. Naldurg, and R. Kravets, "Security-Aware Ad hoc Routing for Wireless Networks," Proc. 2nd ACM Symp. Mobile Ad hoc Networking and Computing (Mobihoc'01), Long Beach, CA, October 2001, pp. 299-302.
  17. Y. Zhang and W. Lee, "Intrusion detection in wireless adhoc networks," 6th annual international Mobile computing and networking Conference Proceedings, 2000.
  18. Payal N. Raj, Prashant B. Swadas, "DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET" IJCSI International Journal of Computer Science Issues, vol. 2, 2009.
  19. Dokurer, Semih. "Simulation of Black hole attack in wireless Ad-hoc networks". Master's thesis, At?l?mUniversity, September 2006.
  20. . Dimple Juneja et al, "Design and Implementation of EAR Algorithm for Detecting Routing Attacks in WSN", International Journal of Engineering Science and Technology Vol. 2(6), 2010, 1677-1683
Index Terms

Computer Science
Information Sciences

Keywords

Aodv Sead Protocol Manet's Threats Manet Security.