- For Authors
- For Reviewers
S.Sangavi Priyadarshini, K.L.N.College of Engineering; Dr. N.Lakshmi Narasimman ,
|Cooperative Bait Detection Scheme (CBDS), Black Hole Attacks, Gray Hole Attacks, Dynamic Source Routing (DSR), Mobile Adhoc Network (MANET), Security Algorithm, Encryption, Decryption|
MANET is a network that consists of mobile autonomous nodes often composed of mobile devices. Here the nodes must cooperate with each other to establish communication. Each node in the MANET acts as a router by cooperating with each other’s to forward data packets. The presence of collaboration of malicious nodes may disrupt the routing processes and lead to network failures. The lack of infrastructure with dynamic topology may lead MANETs to be exposed to black hole attacks and gray hole attacks. If there are malicious nodes present in the MANET it may violate Security conditions and launch grey hole attacks and black hole attacks. This can be overcome by CBDS which is defined using DSR protocol which integrates both proactive and reactive defense architectures. CBDS uses the reverse tracing algorithm. A security algorithm is proposed to enhance security, increase and refine the throughput and increase the packet delivery ratio. The proposed security algorithm outperforms the CBDS scheme.
 P.-C. Tsou, J.-M. Chang, H.-C. Chao and J.-L. Chen, “CBDS: A coopera-tive bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture,” in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5.  S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Consid-erations, Jan. 1999. (Last retrieved March 18, 2013). [Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html  C. Chang, Y. Wang, and H. Chao, “An efficient Mesh-based core multicast routing protocol on MANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229– 239, Apr. 2007.  D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996.  Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp.2727–2740.  Baadache and A. Belmehdi, “Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks,” Intl. J. Comput. Sci. Inf. Security, vol. 7, no. 1, 2010.  S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehav-ior in mobile ad hoc networks,” in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255–265.  K. Vishnu and A. J Paul, “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks,” Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.  K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowledgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.  H. Deng, W. Li, and D. Agrawal, “Routing security in wireless ad hoc network,” IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002.
Paper ID: GRDCF002022|
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 89 - 93