A Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-24 Number-2
Year of Publication : 2015
Authors : Arpana Akash Morey, Dr. Jagdish W. Bakal
DOI :  10.14445/22315381/IJETT-V24P219

Citation 

Arpana Akash Morey, Dr. Jagdish W. Bakal"A Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs", International Journal of Engineering Trends and Technology (IJETT), V24(2),101-106 June 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
In Mobile wireless communication and computing technologies, Mobile Adhoc Networks (MANETs) has growing demands in various applications which has also caused high and complicated security issues in transmission communication wireless networks are sensitive to problems like data tampering and dropping attacks less focused and addressed. This paper has enhanced the accepted protocol due to its ability to adapt rapidly in dynamic network environment with minimum overhead and small management packet size protocol named AODV with ADEHSAM. Our proposed work addresses the main issue breaking links in MANET caused by attacks by outperforming ADEHSAM in terms of normalizing overhead required in many other method to avoid attacks and throughput as well as number of broken links which shows ADEHSAM better than EHSAM.

 References

[1] Mohammad S.,Isaac Woungang,, Sanjay Kumar Dhurandher (2013) “Preventing Packet Dropping and Message Tampering Attacks on AODV-based Mobile Ad Hoc Networks” IEEE 2012.
[2] O. F. Gonzalez, G. Ansa, M. Howarth, G. Pavlou, “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”, Journal of Internet Engineering, Vol. 2, No. 1, pp. 181-192, June 2008.
[3] S. Dhanalakshmi, M. Rajaram, “A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”, IJCSNS International Journal of Computer Science and Network Security, Vol. 8, No.10, Oct., 2008.
[4] S. Choi, D-Y. Kim, D-H Lee, J-I.Jung, “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”, International Conference on Sensor Networks, Ubiquitous, & Trustworthy Computing, (SUTC` 08), June 11-13, Taichung, Taiwan, pp.343-348, 2008.
[5] N., Nasser and C. Yunfeng, “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks”, IEEE Intl. Conference on Communications, Vol. 07, No. 24-28 June, pp. 1154-1159, 2007.
[6] M. Yu, M. Zhou; W. Su, “A Secure Routing Protocol against Byzantine Attacks for MANETs in Adversarial Environments”, IEEE Transactions on Vehicular Technology, Vol. 58, No. 1, Jan., pp.449 – 460, 2009
[7] P. N. Raj and P. B. Swadas, “ DPRAODV: A Dynamic learning system against blackhole attack in AODV based MANET”, Intl. Journal of Computer ScienceIssues, Vol. 2, 2009
[8] X. Li, R. Lu, X. Liang, X. Shen, "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks", Proc. of IEEE Intl. Conference on Communications (ICC?11), Kyoto, Japan, June 5-9, 2011.
[9] K. Osathanunkul, N. Zhang, "A countermeasure to black hole attacks in mobile ad hoc networks", Proc. of Intl. Conference on Networking, Sensing and Control, Delft, Netherlands, Apr. 11-13, pp. 508-513, 2011
[10] S. K. Dhurandher, I. Woungang, A, Gupta, B. Bhargava, "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks", Accepted Nov. 29, 2011,To appear in the proc. of the 8th Intl. Workshop on Heterogeneous Wireless Networks (HWISE?12), in conjunction with AINA-2012, March 26-29, 2012, Fukuoka, Japan.
[11] S. Jain, M. Jain, H. Kandwal, "Advanced algorithm for detection and prevention of cooperative black and grayhole attacks in mobile ad Hoc networks", Intl. Journal of Computer Applications, Vol. 1, No. 7, pp. 37– 42, Feb. 2010.
[12] P-C Tsou, C. J-M Chang, Y-H Lin, H-C Chao, J-L Chen, “Developing a BDSR scheme to avoid blackhole attack based on proactive and reactive architecture in MANETs”, ICACT 2011, Feb. 13~16, Korea, 2011 .
[13] C. Liu, I. Woungang, H-C Chao, S. K. Dhurandher, T-Y Chi, M. S. Obaidat, “Message Security in Multipath Ad Hoc Networks using a Neural Network-Based Cipher”, To appear in the Proc. of the IEEE GLOBECOM 2011, Dec. 5-9, Houston. Texas, USA, 2011.
[14] G. S. Mamatha and S. C. Sharma, “A highly secured approach against attacks in MANETs”, Intl. Journal of Computer Theory and Engineering, Vol. 2, No. 5, Oct. 2010.
[15] Global Mobile Information Systems Simulation Library (GloMoSim), http://pcl.cs.ucla.edu/projects/glomosim/ (Last visited Dec. 3, 2011).

Keywords
MANETs, malicious nodes, simulation, AODV, security, packet dropping attacks, message tampering attacks.