A Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs
Citation
Arpana Akash Morey, Dr. Jagdish W. Bakal"A Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs", International Journal of Engineering Trends and Technology (IJETT), V24(2),101-106 June 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
In Mobile wireless communication and
computing technologies, Mobile Adhoc Networks
(MANETs) has growing demands in various
applications which has also caused high and
complicated security issues in transmission
communication wireless networks are sensitive to
problems like data tampering and dropping attacks
less focused and addressed. This paper has
enhanced the accepted protocol due to its ability to
adapt rapidly in dynamic network environment
with minimum overhead and small management
packet size protocol named AODV with
ADEHSAM. Our proposed work addresses the
main issue breaking links in MANET caused by
attacks by outperforming ADEHSAM in terms of
normalizing overhead required in many other
method to avoid attacks and throughput as well as
number of broken links which shows ADEHSAM
better than EHSAM.
References
[1] Mohammad S.,Isaac Woungang,, Sanjay Kumar
Dhurandher (2013) “Preventing Packet Dropping
and Message Tampering Attacks on AODV-based
Mobile Ad Hoc Networks” IEEE 2012.
[2] O. F. Gonzalez, G. Ansa, M. Howarth, G.
Pavlou, “Detection and Accusation of Packet
Forwarding Misbehavior in Mobile Ad-Hoc
networks”, Journal of Internet Engineering, Vol. 2,
No. 1, pp. 181-192, June 2008.
[3] S. Dhanalakshmi, M. Rajaram, “A Reliable and
Secure Framework for Detection and Isolation of
Malicious Nodes in MANET”, IJCSNS
International Journal of Computer Science and
Network Security, Vol. 8, No.10, Oct., 2008.
[4] S. Choi, D-Y. Kim, D-H Lee, J-I.Jung, “WAP:
Wormhole Attack Prevention Algorithm in Mobile
Ad Hoc Networks”, International Conference on
Sensor Networks, Ubiquitous, & Trustworthy Computing, (SUTC` 08), June 11-13, Taichung,
Taiwan, pp.343-348, 2008.
[5] N., Nasser and C. Yunfeng, “Enhanced
Intrusion Detection System for Discovering
Malicious Nodes in Mobile Ad Hoc Networks”,
IEEE Intl. Conference on Communications, Vol.
07, No. 24-28 June, pp. 1154-1159, 2007.
[6] M. Yu, M. Zhou; W. Su, “A Secure Routing
Protocol against Byzantine Attacks for MANETs in
Adversarial Environments”, IEEE Transactions on
Vehicular Technology, Vol. 58, No. 1, Jan., pp.449
– 460, 2009
[7] P. N. Raj and P. B. Swadas, “ DPRAODV: A
Dynamic learning system against blackhole attack
in AODV based MANET”, Intl. Journal of
Computer ScienceIssues, Vol. 2, 2009
[8] X. Li, R. Lu, X. Liang, X. Shen, "Side Channel
Monitoring: Packet Drop Attack Detection in
Wireless Ad Hoc Networks", Proc. of IEEE Intl.
Conference on Communications (ICC?11), Kyoto,
Japan, June 5-9, 2011.
[9] K. Osathanunkul, N. Zhang, "A countermeasure
to black hole attacks in mobile ad hoc networks",
Proc. of Intl. Conference on Networking, Sensing
and Control, Delft, Netherlands, Apr. 11-13, pp.
508-513, 2011
[10] S. K. Dhurandher, I. Woungang, A, Gupta, B.
Bhargava, "E2SIW: An Energy Efficient Scheme
Immune to Wormhole Attacks in Wireless Ad Hoc
Networks", Accepted Nov. 29, 2011,To appear in
the proc. of the 8th Intl. Workshop on
Heterogeneous Wireless Networks (HWISE?12), in
conjunction with AINA-2012, March 26-29, 2012,
Fukuoka, Japan.
[11] S. Jain, M. Jain, H. Kandwal, "Advanced
algorithm for detection and prevention of
cooperative black and grayhole attacks in mobile
ad Hoc networks", Intl. Journal of Computer
Applications, Vol. 1, No. 7, pp. 37– 42, Feb. 2010.
[12] P-C Tsou, C. J-M Chang, Y-H Lin, H-C Chao,
J-L Chen, “Developing a BDSR scheme to avoid
blackhole attack based on proactive and reactive
architecture in MANETs”, ICACT 2011, Feb.
13~16, Korea, 2011 .
[13] C. Liu, I. Woungang, H-C Chao, S. K.
Dhurandher, T-Y Chi, M. S. Obaidat, “Message
Security in Multipath Ad Hoc Networks using a
Neural Network-Based Cipher”, To appear in the
Proc. of the IEEE GLOBECOM 2011, Dec. 5-9,
Houston. Texas, USA, 2011.
[14] G. S. Mamatha and S. C. Sharma, “A highly
secured approach against attacks in MANETs”,
Intl. Journal of Computer Theory and Engineering,
Vol. 2, No. 5, Oct. 2010.
[15] Global Mobile Information Systems
Simulation Library (GloMoSim),
http://pcl.cs.ucla.edu/projects/glomosim/ (Last
visited Dec. 3, 2011).
Keywords
MANETs, malicious nodes,
simulation, AODV, security, packet dropping
attacks, message tampering attacks.