CFP last date
22 April 2024
Reseach Article

An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s

by Sahana K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 1
Year of Publication: 2017
Authors: Sahana K.
10.5120/ijca2017915062

Sahana K. . An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s. International Journal of Computer Applications. 172, 1 ( Aug 2017), 41-45. DOI=10.5120/ijca2017915062

@article{ 10.5120/ijca2017915062,
author = { Sahana K. },
title = { An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 1 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number1/28219-2017915062/ },
doi = { 10.5120/ijca2017915062 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:13.107390+05:30
%A Sahana K.
%T An Energy Efficient and Secure Cooperative Bait Detection and Defense Approach in MANET’s
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 1
%P 41-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Because of the confinements of wired system in crisis circumstances like natural calamities, scope for wireless technology is expanded. Mobile Adhoc Networks technology provides more room for research. Due to the MANET characteristics, such as dynamic topology and infrastructure less, it can be stationed whenever and wherever required. Hence it can be used in many applications. In MANET, to establish the communication among the nodes, nodes should coadjutant to each other. Nodes may disrupt complete routing process in the presence of malignant nodes and this leads to serious security threat. In this context thwarting or detecting malignant nodes launching grayhole or collaborative blackhole attack is a challenge. This paper attempts to solve this issue by designing energy efficient and secured dynamic source routing mechanism, which is also cited as cooperative bait detection and defense scheme (CBDDS), which integrates the advantages of proactive and reactive defense architectures. Reverse tracing technique is used to achieve the stated goal. Design is simulated in the presence of malignant node attacks, the CBDDS outflanks as far as packet delivery ratio, end to end delay, throughput and routing overhead which are picked as execution measurements over the DSR and 2ACK directing convention picked as benchmarks.

References
  1. P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture,” Wireless Commun., VITAE, Chennai, India, 2011.
  2. Jian-Ming Chang, Po-Chun Tsou, Isaac Woun gang, Han-Chieh Chao, and Chin-Feng Lai, Member, IEEE, Defending against collaborative attacks by malicious nodes in MANETs: A Cooperative Bait Detection Approach, January,2014, pp.65-75
  3. S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, March, 2013.
  4. I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: Amobile-backbone protocol for ad hoc wireless networks,” in Proc. IEEEAerosp. Conf., 2002, vol. 6, pp. 2727–2740.
  5. A. Baadache and A. Belmehdi, “Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks,” Intl. J. Comput. Sci. InfSecurity, vol. 7, no. 1, 2010.
  6. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255–265.
  7. K. Vishnu and A. J Paul, “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks,” Int. J. Comput. Appl.,vol. 1, no. 22, pp. 28–32, 2010.
  8. K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowledgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
  9. H. Deng, W. Li, and D. Agrawal, “Routing security in wireless adhoc network,” IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
  10. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard,“Prevention of cooperative blackhole attacks in wireless ad hoc networks,” in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570–575.
  11. H. Weerasinghe and H. Fu, “Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation,” in Proc. IEEE ICC, 2007, pp. 362–367.
  12. Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless Pers.Commun, vol. 29, pp. 367–388, 2004.
  13. W. Kozma and L. Lazos, “REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits,” in Proc. WiSec, 2009, pp. 103–110.
  14. W. Wang, B. Bhargava, and M. Linderman, “Defending against collaborative packet drop attacks on MANETs,” in Proc. 28th IEEE Int. Symp.ReliableDistrib. Syst., New Delhi, India, Sep. 2009.
Index Terms

Computer Science
Information Sciences

Keywords

CBDDS-Cooperative Bait Detection and Defense Scheme BFTR-Best Fault Tolerance Routing DSR-Dynamic Source Routing MANET-Mobile Adhoc Networks.