Cooperative Intrusion Detection Technique Against Blackhole and DoS Attacks in MANET

Issue: Vol.7 No.1

Authors:

Aasif Hasan (Manav Rachna International University, Faridabad)

Suresh Kumar (Manav Rachna International University, Faridabad)

M K Soni (Manav Rachna International University, Faridabad)

Keywords: MANET; DoS; Blackhole; Attacks; Packet Delivery Ratio, Infected Nodes.

Abstract: 

The display of the inspiring applications from the Mobile Ad-hoc collect so much name and fame in the practical world as well as research and technologies and this is because of their self-maintaining and autonomous nature. The node can quickly able to change their places that make the network movable, which is differ from any other sort of networks. In MANETs generally, there is absence of centralized control unit. Therefore the mutual corporations within the working entities are responsible to detect the routes towards the destination. Mobile Ad hoc is extremely defenseless to attacks because of its dynamic nature of their infrastructure, Out of all these attacks, routing attacks haves grabbed much attention, As it is capable of destructive damage to MANET. But somehow according to our experience there is no protocol which is complete by their selves. Hence we concentrate on making the On Demand Adhoc Vector (AODV) better to preserve it form the blackhole attacks and DoS. We have to analysis this work process regarding many performance matrices. The given work simulates with the help of the NS2 simulator.

References:

[1] B. Wu, J. Chen, J. Wu, and M. Cardei, “A Survey on Attacks and Countermeasures in MANETs, Springer, 2006, ch. 12.

[2] Morli Pandya and Ashish Kr. Shrivastava , “Improvising the Performance with Security of AODV Routing Protocol in MANETs,” IEEE 2013 Nirma University International Conference on Engineering (NUiCONE).

[3] N. Sharma and A. Sharma. The black-hole node attack in MANET. In Proceedings of the 2012 Second Interntional Corifence on Advanced Computing & Communication Technologies, ACCT ‘ 12, pages 546-550, Washington, DC, USA, 2012. IEEE Computer Society

[4] Y Guo and S. Perreau, “Detect DDoS floding attacks in mobile ad hoc networks,” Int. 1 Secur Netw., 5(4):259- 269, Dec. 2010.

[5] Dilli Ravilla and Dr Chandra Shekar Reddy Putta ,” Performance of Secured Zone Routing Protocol due to the Effect of Malicious Nodes in MANETs,” IEEE- 4th ICCCNT - 2013 July 4 - 6, 2013, Tiruchengode, India.

[6] Ajay Jangra, Shalini and Nitin Goel ,” Prevention And Reaction Based Secure Routing In Manets,” Journal of Global Research in Computer Science, Volume 2, No. 6, June 2011.

[7] Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala, “A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad-hoc Networks,” IEEE-2012 Second International Conference on Advanced Computing & Communication Technologies.

[8] Suresh Kumar, Gaurav Pruthi, Ashwani Yadav and Mukesh Singla, “Security protocols in MANETs,” IEEE-2012 Second International Conference on Advanced Computing & Communication Technologies.

[9] Weichao Wang, Yi Lu, Bharat Bhargava, “On Security Study of Two Distance Vector Routing Protocols for Mobile Adhoc Networks”, IEEE, 2003, 0-7695-1893- 1/03.

[10] L. Tamilselvan and D. V. Sankaranarayanan, “Prevention of blackhole attack in manet,” 2007.

[11] Ming-Yang Su, “Prevention of Selective Black hole Attacks on Mobile Ad hoc Network through Intrusion Detection Systems”, Computer Communications, 2010. Communications, 2007, pp. 21-26.

[12] Latha Tamilselvan, V. Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, Journal of Networks, Vol 3, No 5, 13-20, May 2008.

[13] Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Jtheynal of Computer Science Issues, Vol. 2, 2009.

[14] Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey and Keyurbhai A Jani,”Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs,” IEEE-2014 Fourth International Conference on Advanced Computing & Communication Technologies.