CFP last date
20 May 2024
Reseach Article

Performance Evaluation of Byzantine Rushing Attack in ADHOC Network

by Neha Agrawal, Krishna Kumar Joshi, Neelam Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 6
Year of Publication: 2015
Authors: Neha Agrawal, Krishna Kumar Joshi, Neelam Joshi
10.5120/ijca2015905339

Neha Agrawal, Krishna Kumar Joshi, Neelam Joshi . Performance Evaluation of Byzantine Rushing Attack in ADHOC Network. International Journal of Computer Applications. 123, 6 ( August 2015), 1-4. DOI=10.5120/ijca2015905339

@article{ 10.5120/ijca2015905339,
author = { Neha Agrawal, Krishna Kumar Joshi, Neelam Joshi },
title = { Performance Evaluation of Byzantine Rushing Attack in ADHOC Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number6/21960-2015905339/ },
doi = { 10.5120/ijca2015905339 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:09.475295+05:30
%A Neha Agrawal
%A Krishna Kumar Joshi
%A Neelam Joshi
%T Performance Evaluation of Byzantine Rushing Attack in ADHOC Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 6
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The MANET incorporates mobile nodes that forward information or packets from node to node without a wired connection. The topology changes rapidly and unproductively, there is no central control for routing of packets hence the communication is on mutual trust. There are many proposed routing protocol in which on-demand routing is most preferable among all as its overhead is very low. Thus attention has been paid on developing a secure reactive protocol against various attacks. In this proposed work effect of rushing attack is presented over AODV. This attack results in denial-of-services and is effectively damaging as it can also be performed by weak attacker.

References
  1. B. A. David Holmer, Reza Curtmola, “Mitigating byzantine attacks in ad hocwireless networks”, Technical Report Version 1, March 2004.
  2. Wikipedia: Attack (computing) August 2012 “http://en.wikipedia.org/wiki/Attack(computing)”, August 2012.
  3. C. X. Lujie Zhong, “Byzantine attack with anypath routing in wireless mesh networks,” IEEE Proceedings of IC-BNMT, vol. 1.0, pp. 711–715, 26-28 Oct 2010. 3rd IEEE International Conference.
  4. S. E. S. Steven R Snapp, “The distributed intrusion detection system prototype,” In Proceedings of the Summer USENIX Conference, pp. 227– 233, June 1992.
  5. G. F. Calvin Ko, “Automated detection of vulnerabilities in privileged programs by execution monitoring,” In Proceedings of the 10th Annual Computer Security Applications Conference, IEEE Computer Society Press, vol. xiii, pp. 134–144, May 1994.
  6. S. C. S. Stani ford Chen, “Grids-a graph based intrusion detection system for large networks,” In Proceedings of the 19th National Information Systems Security Conference, 1996.
  7. G. White and V. Pooch, “Cooperating security managers: Distributed intrusion detection systems,” Computers & Security, Elsevier Science Ltd., 1996.
  8. F. G. Y. Frank Jou, “Architecture design of a scalable intrusion detection system for the emerging network infrastructure,” Department of Com-puter Science, North Carolina State University, Releigh, N.C, USA, April 1997.
  9. P. A. Porras and P. G. Neumann, “Automated detection of vulnerabilities in privileged programs by execution monitoring,” In Proceedings of the 10th Annual Computer SecurityMApplications Conference, IEEE Computer Society Press, October 1997.
  10. Cabrera, Gutierrez, and Mehra, “Infrastructures and algorithms for dis-tributed anomalybased intrusion detection in mobile ad-hoc networks,” Military Communications Conference, 2005. MILCOM 2005,IEEE, vol. 3, pp. 1831–1837, October 2005.
  11. S. Marano, V. Matta, and L. Tong, “Distributed detection in the presence of byzantine attack in large wireless sensor networks,” Military Com-munications Conference, 2006. MILCOM 2006, IEEE, pp. 1–4, October 2006.
  12. A. R. Sangi, J. Liu, and L. Zou, “A performance analysis of aodv routing protocol under combined byzantine attacks in manets,” Computational Intelligence and Software Engineering, 2009. CiSE 2009, IEEE, vol. 3, pp. 1–5, December 2009.
  13. P. Yi, Y. Wu, and J. Ma, “Experimental evaluation of flooding attacks in mobile ad hoc networks,” Communications Workshops, 2009. ICC Workshops 2009. IEEE International Conference, pp. 1–4 ISBN:978–1– 4244–3437–4, 2009.
  14. A. S. ALshahrani, “Rushing attack in mobile ad hoc networks,” Third International Conference on Intelligent Networking and Collaborative Systems, pp. 752–758 ISBN: 978– 1–4577–1908–0, 2011.
  15. M. H. Rehmani, S. Doria, and M. R. Senouci, A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector Protocol in Network Simulator. June 2009.
  16. Prof. S.B. Javheri and Shwetambari Ramesh Patil, “Attacks Classification in Network”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 3, 2013, pp. 1 - 11, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.
  17. Nada M. Badr and Noureldien A. Noureldien, “Review of Mobile Ad Hoc Networks Security Attacks and Countermeasures”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 145 - 155, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
  18. Neha Kaushik and Ajay Dureja, “A Comparative Study of Black Hole Attack in Manet”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 93 - 102, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
  19. Sharada Valiveti, Hetuk Upadhyay and Dr. K Kotecha, “Analyzing The Performance of Bandwidth Starvation Attack in Lan”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 5, Issue 1, 2013, pp. 145 - 153, ISSN Print: 0976-6480, ISSN Online: 0976-6499.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Byzantine Rushing Attack Reactive Protocol AODV