CFP last date
20 May 2024
Reseach Article

NAODV-Distributed Packet Dropping Attack Detection in MANETs

by Bobby Sharma Kakoty, S. M. Hazarika, N. Sarma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 11
Year of Publication: 2013
Authors: Bobby Sharma Kakoty, S. M. Hazarika, N. Sarma
10.5120/14495-2879

Bobby Sharma Kakoty, S. M. Hazarika, N. Sarma . NAODV-Distributed Packet Dropping Attack Detection in MANETs. International Journal of Computer Applications. 83, 11 ( December 2013), 29-35. DOI=10.5120/14495-2879

@article{ 10.5120/14495-2879,
author = { Bobby Sharma Kakoty, S. M. Hazarika, N. Sarma },
title = { NAODV-Distributed Packet Dropping Attack Detection in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 11 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number11/14495-2879/ },
doi = { 10.5120/14495-2879 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:07.553573+05:30
%A Bobby Sharma Kakoty
%A S. M. Hazarika
%A N. Sarma
%T NAODV-Distributed Packet Dropping Attack Detection in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 11
%P 29-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network (MANET) is a self configuring network in which mobile nodes are connected by wireless link. Communication in MANET is done with the help of cooperation of nodes in the network. Due to its intrinsic properties like dynamic network topology, open medium, lack of central monitoring system, these are vulnerable to several attacks. Out of different attacks, packet dropping attack is considered as one of the serious threats as in this kind of attack, malicious node invariably drops the packets which are supposed to be forwarded to destination. Thus, it degrades network performance. In this paper, a distributed packet dropping attack (PDA) detection methodology named NAODV, is proposed. Detection and isolation of malicious node is based on cooperative participation of nodes involved in communication based on TRUST level of the nodes. TRUST levels of the nodes are dynamically updated based on their qualitative participation in detection of malicious nodes. Performance of this methodology is evaluated through simulation in different network scenarios and results are compared with two existing methodologies.

References
  1. D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko,R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt and J. Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs", Proceedings of the Third IEEE International Workshop on Information Assurance, IEEE Computer Society Washington, DC, USA ©2005, Pages 57-70, ISBN:0-7695-2317-X
  2. Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer, "An Intrusion Detection Tool for AODV-basedAdhocWirelessNetworks", Computer Security Applica-ions Conference 2004,Page(s):16 27, ISSN : 1063-9527, Print ISBN:0-7695-2252-1
  3. Jaydip Sen, "A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes In A Mobile Adhoc Network", International Journal of Network Security & Its Applications (IJNSA) 2010, Vol. 2, No. 4
  4. Chin- Yang Henry Tseng, "Distributed Intrusion Detection Models for Mobile AdHoc Networks", DISSERTATI on Submitted in partial satisfaction of the requirements for the degree of Doctor Of Philosophy in Computer Science in the office of graduate studies of the University of California Davis
  5. Alper Tugay M ?zrak, Yu -Chung Ch eng, Keith Marzullo and Stefan Savage, "Faith: Detecting and Isolating Malicious Routers", IEEE Transactions On Dependable And Secure Computing 2006, VOL. 3, NO. 3
  6. A. Rajaram and Dr. S. Palaniswami, "Malicious Node Detection System for Mobile Ad hoc Networks", (IJCSIT) International Journal of Computer Science and Information
  7. Technologies, 2010,Vol. 1, no. 2 , pages:77-85
  8. Muhammad Zeshan, Shoab A. Khan, Ahmad Raza Cheema and Attique Ahmed ,"Adding Security against Packet Dropping Attack in Mobile Ad hoc Networks", Future Information Technology and Management Engineering, 2008. FITME '08. International Seminar( 2008 IEEE), Page(s):568 –
  9. 572, Print ISBN:978-0-7695-3480-0
  10. Soufiene Djahel, Farid Nat-abdesselam and Zonghua Zhang,"Mitigating Packet Dropping Problem in Mobile AdHoc Networks: Proposals and Challenges", IEEE communications surveys & tutorials(2011), vol. 13, No. 4
  11. Julian Benadit. P, Sharmila Baskaran and Ramya Taimanessamy, "Detecting Malicious Packet Dropping Using Statistical Traffic Patterns", IJCSI International Journal of Computer Science Issues(2011), Vol. 8, Issue 3, No. 2, ISSN (Online): 1694-0814
  12. V. Madhu Viswanatham and A. A. Chari, "An Approach for Detecting Attacks in Mobile Adhoc Networks", Journal of Computer Science 2008, Volume 4, Issue 3, Pages 245-251
  13. Ricardo Puttini, Jean-Marc Percher, Ludovic Mé and Rafael de Sousa, "A Fully Distributed IDS for MANET", Computers and Communications, 2004. Proceedings. ISCC 2004. Vol. 1, Page(s): 331 – 338, Print ISBN: 0-7803-8623-X
  14. Tanapat Anusas-amornkul, "On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks", Submitted to the Graduate Faculty of the School of Information Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2008
  15. Shukla Banerjee, "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks," Proceedings of the World Congress on Engineering and Computer Science 2008, USA
  16. Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen, "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks", Communications (ICC), 2011 IEEE International Conference, Page(s): 1-5, ISSN : 1550-3607, E-ISBN :978-1-61284-231-8, Print ISBN: 978-1-61284-232-5
  17. Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris, "Intrusion Detection of Packet Dropping Attacksin Mobile AdHoc Networks", Ayia Napa, Cyprus, July 6-7, 2006
  18. Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G. , Harish Reddy, "A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks", Telecommunic-ations and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference, Page(s):75 – 80, E-ISBN :978-1-4244-1094-1,Print ISBN:978-1-4244-1094-1
  19. Aishwarya Sagar Anand Ukey, Meenu Chawla, "Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814
  20. P. E. Utgoff, "Incremental Induction of Decision Trees", Machine Learning, Vol. 4, No. 2, pages:161-186, 1989.
  21. Dimitrios Kalles and Tim M Orris, " Efficient Incremental Induction of Decision Tree", Machine Learning, 1 , 1{13 (1995) 1995 Kluwer Academic Publishers, Boston. Manufactured in T he Netherlands
  22. Ding-An Chiang, Wei Chen, Yi-Fan Wang And Lain-Jinn Hwang, "Rules Generation From the Decision Tree", Journal of Information Science and Engineering 17, 325-339 (2001)
  23. Sam Chao, Fai Wong, "An Incremental Decision Tree Learning Methodology Regarding Attributes In Medical Data Mining", Machine Learning and Cybernetics, 2009 International Conference, Page(s):1694 – 1699, E-ISBN :978-1-4244-3703-0, Print ISBN:978-1-4244-3702-3
  24. Ahmed Mohamed Abdalla, Ahmad H. Almazeed, Imane Aly Saroit and Amira Kotb "Detection and Isolation of Packet Dropping Attacker in MANETs ", (IJACSA) International Journal of Advanced Computer Science and Applications 2013, Vol. 4, No. 4
  25. Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G. and Harish Reddy, "A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks", Telecommunications and Malaysia International Conference on Communications, 2007. ICT-MICC 2007. IEEE International Conference, Page(s):75 – 80, E-ISBN :978-1-4244-1094-1, Print ISBN:978-1-4244-1094-1
  26. Aishwarya Sagar Anand Ukey and Meenu Chawla, "Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET", IJCSI International Journal of Computer Science Issues 2010, Vol. 7, Issue 4, No 1, ISSN (Online): 1694-0784, ISSN (Print): 1694-0814
  27. Djamel Djenouri and Nadjib Badache, "On eliminating packet droppers in MANET: A modular solution", Elsevier, AdHoc Networks (2009), Volume 7 Issue 6, Pages 1243-1258
  28. Leovigildo Sánchez-Casado, Gabriel Mací-Fernández and Pedro Garcia-Teodoro "An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs", Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Pages 231-238, ISBN: 978-0-7695-4745-9
  29. Tao Shu and Marwan Krunz "Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing", Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks 2012, Pages 87-98, ISBN: 978-1-4503-1265-3
  30. S. Madhavi, K. Duraiswamy, B. Kalaavathi and S. Vijayaragavan, "Performance Analysis of SAODV with DOS Attack", International Journal of Electronics Communication and Computer Engineering, Vol 3, Issue 2, ISSN 2249 –071X
  31. Xiaoqi Li, Michael R. Lyu and Jiangchuan Liu, "A Trust Model Based Routing Protocol for Secure Ad Hoc Networks", Aerospace Conference, 2004. Proceedings. 2004 IEEE, Vol. 2, Page(s):1286 – 1295, ISSN :1095-323X, Print ISBN:0-7803-8155-6
  32. S. Madhavi, K. Duraiswamy, B. Kalaavathi and S. Vijayaragavan, "Performance Analysis of SAODV with DOS Attack", International Journal of Electronics Communication and Computer Engineering, Vol 3, Issue 2, ISSN 2249 –071X
  33. Xiaoqi Li, Michael R. Lyu and Jiangchuan Liu, "A Trust Model Based Routing Protocol for Secure Ad Hoc Networks", Aerospace Conference, 2004. Proceedings. 2004 IEEE, Vol. 2, Page(s):1286 – 1295, ISSN :1095-323X, Print ISBN:0-7803-8155-6
  34. R. Balakrishna, U. Rajeswar Rao , Dr. Geethanjali and M. S. Bhagyashekar, "Comparisons of SAODV and TAODV, DSR Mobile ad hoc network Routing Protocols", Int. J. Advanced Networking and Applications 445 2010, Vol- 02, Issue: 01 Pages: 445-451 (2010)
  35. S. Madhavi K. Duraiswamy B. Kalaavathi S and Vijayaragavan, "Performance Analysis of SAODV with DOS Attac", International Journal of Electronics Communication and Computer Engineering, Volume 3, Issue 2, ISSN 2249 –071X
  36. Latha Tamilselvan and Dr. V. Sankaranarayanan?, "Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks," IJCSNS International Journal of Computer Science and Network Security 2007, VOL. 7 No. 3
  37. Er. Gurjeet Singh, "Performance and Effectiveness of Secure Routing Protocol in Manet", Global journal of computer science and technology 2012, Volume 12 Issue 5
  38. Yuxia Lin, A. Hamed Mohsenian Rad, Vincent W. S. Wong and Joo-Han Song, "Experimental Comparisons between SAODV and AODV Routing Protocols", WMuNeP'05.
  39. Mrs. P. Vigneswari, R. Anusha, D. Preethi, R. Jayashree, V. Nandhini, Comparative Analysis of and Trusted AODV (TAODV) in MANET", International Journal of Advanced Information Science and Technology (IJAIST) 2013, ISSN: 2319:2682 Vol. 10, No. 10
Index Terms

Computer Science
Information Sciences

Keywords

MANET PDA distributed packet dropping attack TRUST CONFIDENCE decision tree.