AN ENHANCE APPROACH FOR DETECTING AND PREVENTING SINGLE AND COLLABORATIVE ATTACKS IN MOBILE AD-HOC NETWORKS
Abstract
Mobile ad hoc network is a system of wireless mobile nodes that are dynamically self-organize in arbitrary and temporary topologies, with no fixed set of communication infrastructure and lack centralized administration, where network devices are inter-connected through wireless interface. Mobile nodes in Mobile ad-hoc Networks not only act as a host but as a router or relay stations for forwarding packets from source to destination. The dynamic nature and other characteristics of MANETs such as nodes mobility dynamic and topological changes makes it highly susceptible to various security attacks ranging from collaborative black hole/ gray hole attacks, sink hole attacks to eavesdropping attacks. The mentioned attacks mainly disrupt the routing process by giving false
routing information in MANETs, thus finding safe routing path by avoiding malicious nodes is a genuine challenge. The research work aim at in cooperating RSA encryption algorithm to the cooperative bait detection scheme. The proposed work allow the source to use public key crypto system (in this case RSA) to encrypt data before transmitting it to the destination after the initial reverse tracing operations, it eliminate the used threshold value to indicate the reoccurrence of malicious nodes, it also eliminate the use of confirmation RREQ, since the public key cryptosystem introduced by the proposed work is sufficient enough to cover the transmitted data from an unknown attacker. The research work was simulated using network simulator tool NS2 and simulation results shows that the proposed works show an increase in packet delivery ratio, and a remarkable decrease
References
Abinaya, V. & D. S., (2016). Hop count based enhanced cooperative bait detection scheme to prevent cooperative black hole attacks in MANETs. International Journal of Research and Application, 7(2), pp. 253-260. 7 pages.
Boora, S. & Ohri, S., (2013). A survey of layer specific and cryptographic primitive attacks and their counter measures in MANETs. International journal of P2P network trend and Technology (IJPTT), 3(4).
Jiang-Ming Chan, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao and Ching-Feng Lai., (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEE system journal.
Foruuzan, B. A.,(2008). Data communication and networking. 4th ed. New York: McGraw Hill Inc.
Vishnu K. and Amos J Paul., (2010). Detection and removal of cooperative black hole gray hole attacks in MANETs. international journal of computer application , 1(22).
Mohan M. and Ramakrishna M., (2015). A survey on secured cooperative bait detection approach for detecting malicious nodes in MANETs. International journal of recent and innovative trends in computing and communication, 13(3).
Bello Musa Yakubu, Mr. Pankaj Chajera and Dr. Ahmed Baita Garko., (2015). Advance secured method for data transmission in MANETs using RSA algorithm. International journal of advance technology in engineering and science , 3(1).
A. Syeda Mustapha, Dr. C. Nelson Kennedy Babu and R. Kasthuri., (2016). Token ring based cooperative bait detection scheme for both selfish and malicious nodes attack in ad-hoc communication. Middle east journal of scientific research, 4(24).
PP, A.-J. & Chacko, B., (2013). ECBDS: Enhanced cooperative bait detecction scheme for preventing collaborative attacks in MANETS. International journal of science and research, 6(4).
Ramaswamy, S. et al., (2013). Prevention of cooperative black hole attacks in wireless ad-hoc networks. International journal of innovative science engineering and technology , 3(3).
Rana, A., Rana, V. & Gupta, S., (2014). EMAODV: Technique to prevent cooperative attacks in MANETs. Mumbai, International conference on eco-friendly computing and communication system.
Suntana, S. A. & Kazi, S. B., (2015). Reverse tracing scheme to prevent cooperative attacks in MANETs. International journal of emreging technology in computer science and electronics , 14(4).
Copyright (c) 2023 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences