CFP last date
20 January 2025
Reseach Article

Detecting and Preventing Attacks in MANET

by Jasleen Arora, Paramjeet Singh, Shaveta Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 5
Year of Publication: 2013
Authors: Jasleen Arora, Paramjeet Singh, Shaveta Rani
10.5120/14007-2056

Jasleen Arora, Paramjeet Singh, Shaveta Rani . Detecting and Preventing Attacks in MANET. International Journal of Computer Applications. 81, 5 ( November 2013), 14-18. DOI=10.5120/14007-2056

@article{ 10.5120/14007-2056,
author = { Jasleen Arora, Paramjeet Singh, Shaveta Rani },
title = { Detecting and Preventing Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 5 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number5/14007-2056/ },
doi = { 10.5120/14007-2056 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:16.082765+05:30
%A Jasleen Arora
%A Paramjeet Singh
%A Shaveta Rani
%T Detecting and Preventing Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 5
%P 14-18
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET network is a type of decentralized network and is high vulnerable network which requires secure communication. A significant security issue in manet is to protect the network layer from malicious nodes that misbhaves often to obtain the data that is not broadcasted for them i. e gray hole attacks aka selective forwarding attack that leads to denial of service attack(DoS) . In this paper The overall objective is to find the nodes which frequently misbehaves and based upon their miss ratio they will be eliminated from the network. The proposed strategy does not allow unauthorized nodes to access the data frames multicast by the initiators. The proposed strategy is designed and implemented in MATLAB using mathematics toolbox. The experimental results have shown significant improvement in detecting the malicious nodes.

References
  1. A. Boomarani Malany, V. R. Sarma Dhulipala and RM. Chandrasekaran, "Throughput and Delay Comparison of MANET Routing Protocols", Int. J. Open Problems Compt. Math, Vol. 2, No. 3, ISSN 1998-6262, September 2009.
  2. Vishnu K and Amos J Paul, "Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile ADHOC Networks", International Journal of Computer Applications, Vol. 1, No. 22, 2010.
  3. G. S. Mamatha and Dr. S. C. Sharma, "A Highly Secured Approach against Attacks in MANETs", International Journal of Computer Theory and Engineering, Vol. 2, No. 5, October 2010.
  4. Anuj K. Gupta, Harsh Sadawarti and Anil K. Verma, "Review of Various Routing Protocols in MANETs", International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011.
  5. Sudhir Agrawal, Sanjeev Jain and Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-hoc Networks", Journal of Computing, Vol. 3, ISSN 2151-9617, January 2011.
  6. Ahmed Nabet, Rida Khatoun, Lyes Khoukhi, Juliette Dromard and Dominique Gaiti, "Towards Secure Route Discovery Protocol in MANET", Conference Publication, August 2011.
  7. Radhika Saini and Manju Khari, "Defining Malicious Behaviour of a Node and its Defensive Methods in Ad Hoc Networks", International Journal of Computer Applications, Vol. 20, No. 4, April 2011.
  8. Robinpreet Kaur and Mritunjay Kumar Rai, "A Novel Review on Routing Protocols in MANETs", Undergraduate Academic Research Journal, Vol. 1, ISSN: 2278-1129, 2012.
  9. Rajib Das, Dr. Bipul Syam Purkayastha and Dr. Prodipto Das, "Security Measures for Black Hole Attack in MANET: An Approach", International Journal of Engineering Science and Technology, Vol. 3, No. 4, pp- 2832-2838, ISSN: 0975-5462, April 2012.
  10. Shashank Khare, Manish Sharma, Namrata Dixit and Sumit Agarwal, "Security in Routing Protocol to Avoid Threat of Black Hole Attack in MANET", VSRD International Journal of Electrical, Electronics and Communication Engineering, Vol. 2 (6), pp- 385-390, ISSN: 2231-3346, 2012.
  11. Onkar V. Chandure and V. T. Gaikwad, "Detection and Prevention of Gray Hole Attack in Mobile Ad- Hoc Network using AODV Routing Protocol", International Journal of Computer Applications, Vol. 41, No. 5, ISSN: 0975- 8887, March 2012.
  12. Shobha Arya and Chandrakala Arya, "Malicious Node Detection in Mobile Ad- Hoc Networks", Journal of Information Operations Management, Vol. 3, pp- 210-212, ISSN: 0976-7754, January 2012.
  13. Arnab Banerjee, Dipayan Bose, Aniruddha Bhattacharyya, Himadri Nath Saha and Dr. Debika Bhattacharyya, "Administrator and Trust Based Secure Routing in MANET", International Conference on Advances in Mobile Network, Communication and its Applications, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Gray hole attack Miss ratio Multicasting