CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET

by Khushboo Tunwal, Priyanka Singh Dabi, Pankaj Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 24
Year of Publication: 2014
Authors: Khushboo Tunwal, Priyanka Singh Dabi, Pankaj Sharma
10.5120/16746-7051

Khushboo Tunwal, Priyanka Singh Dabi, Pankaj Sharma . An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET. International Journal of Computer Applications. 95, 24 ( June 2014), 39-43. DOI=10.5120/16746-7051

@article{ 10.5120/16746-7051,
author = { Khushboo Tunwal, Priyanka Singh Dabi, Pankaj Sharma },
title = { An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 24 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number24/16746-7051/ },
doi = { 10.5120/16746-7051 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:20.852460+05:30
%A Khushboo Tunwal
%A Priyanka Singh Dabi
%A Pankaj Sharma
%T An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 24
%P 39-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is considered as an infrastructure less data network where the nodes can behave as source or router (packet forwarder) which helps the network to cover the longer distances with low power transmission. Since it does not require any centralized controlling system and can organize itself without external interfere it's a preferable choice for the small battery operated clustered system such mobile and PDA. The self-organizing nature of MANET makes it very flexible and dynamic which can adopt variety of system configuration. Although to provide such services the protocols designed for MANET contains many security loop holes which makes it prone to network attacks and easy target for attackers. Although many types of active and passive attacks currently known, this paper focuses on Sink-hole attack which is a sub-category of Black-hole attack. The sink-hole is considered as one of the most serious attacks in MANET because it force the traffic to pass through attackers node by manipulating the routing protocol and then node drops all the traffic, which causes degradation of networks performance. This paper present an individual trust managing technique to prevent against sink-hole attack. The proposed algorithm is simulated using network simulator NS2 and the results shows that the proposed algorithm greatly reduces the sink-hole impact and performs much better than previous algorithm.

References
  1. YANG XIAO, XUEMIN SHEN and DING-ZHU DU "Wireless Network Security", Signals and Communication Technology 2007, Springer.
  2. R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in Proceedings of IEEE Consumer Communications and Networking Conference (CCNC '06), Las Vegas, USA, January 2006, pp. 640–644.
  3. Junaid Ahsenali Chaudhry, Usman Tariq, Mohammed Arif Amin, Robert G. Rittenhouse "Dealing with Sinkhole Attacks in Wireless Sensor Networks", Advanced Science and Technology Letters Vol. 29 (SecTech 2013), pp. 7-12.
  4. Jiangchuan Liu, Edith C. H. Ngai and Michael R. Lyu "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks", Communications, 2006. ICC '06. IEEE International Conference on (Volume:8 ) June 2006.
  5. Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou "Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side", Networking and Communications, 2008. WIMOB '08. IEEE International Conference on Wireless and Mobile Computing, 12-14 Oct. 2008.
  6. Fabrice Le Fessant, Anthonis Papadimitriou, Cigdem Sengul, Aline Carneiro Viana"Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks", Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on 13-13 Oct. 2009.
  7. Andrew J. Stephenson, Dr. Eric Harder "Sinkhole Avoidance Routing in Wireless Sensor Networks", Trident Research Project Information Technology Major, May 9, 2011.
  8. Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy "Denial of Service Attacks in Wireless Networks: The Case of Jammers", IEEE Communications Surveys & Tutorials, Vol. 13, No. 2, Second Quarter 2011.
  9. Satyajayant Misra, Kabi Bhattarai and Guoliang Xue "BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks", Communications (ICC), 2011 IEEE International Conference on 5-9 June 2011.
  10. Zahra moradi, Amir Masoud Rahmani, Mohammad Teshnehlab "Implimantaion of Neural Networks for Intrusion Detection in MANET", International Conference of Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on 23-24 March 2011.
  11. Junaid Ahsenali Chaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse "Sinkhole Vulnerabilities in Wireless Sensor Networks", International Journal of Security and Its Applications Vol. 8, No. 1 (2014), pp. 401-410.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Sink-hole Attack Black-hole attack Individual Trust Management.