SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3146
Secure Data Transmission from Malicious Attacks: A Review
Anuradha T
Department of CSE, PDA College of Engineering, Kalaburgi, Karnataka, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Secure transmission refers to the transferofdata
such as confidential or propriety information over a secure
channel. Many secure transmission methods require a type of
encryption. Security is a main issue of the mobile ad-hoc
network, because of ad-hoc property the newlynodeeasilyjoin
or leave the network. While transmission from one node to
another nodes establish a path with the help of intermediate
nodes. Due to the mobility of nodes in the network the
malicious nodes can be easily introduced in the network and
the network can be compromised. Because of dynamic nature
of the network it is important to maintain the security of the
network. The performance of the network depends on the
behaviour of the nodes. In this paper, the main focus is to
study and analyse the different techniques and system
proposed by the researchers for various attacks and detection
for secure data transmission.
Key Words: MANETs, AODV, Security attacks,
Cryptography techniques.
1. INTRODUCTION
Mobile Ad-hoc Network (MANET) is a self-organized
wireless network of mobile nodes without any fixed
infrastructure. Nodesroam through the network, causingits
topology to change rapidly and unpredictably over time.
New nodes can join the network, whereas at the same time
other nodes leave it or just fail to connect (temporarily)
because they move to a region that is not in the cover range
of the network. Nodes are typically wireless devices such as
PDAs, laptops or cellular phones. From the very beginning,
the use of MANETs has been appealing for bothmilitary and
civilian applications, especially in the last decade because of
development of wireless LAN technology. Due to their
inherent characteristics of dynamic topology and lack of
centralized management security, MANET is vulnerable to
various kinds of attacks. These include passive
eavesdropping, active interfering,impersonating,anddenial-
of-service. Malicious attack is one of manypossibleattacksin
AODV-based MANETs. In this attack, a malicious node sends
a forged route reply (RREP) packet to source node that
initiates the route discovery in order to pretend to be the
destination node. The standard of AODV protocol,thesource
node compares the destination sequence number contained
in RREP packets when a source node received multiple
RREP, it judges the greatest one as the route contained in
that RREP packet. In case the sequence numbers are equal,it
selects the route with the smallest hop count. As the result,
the data transmission will flow towardthemaliciousnodeby
source node and it will be dropped.
MANET is a network continuously self-configuring
infrastructure-less network of mobile devices connected
wirelessly that are composed of mobile devices or other
mobile pieces, that can arrange themselves in various ways
and operate without strict top-down network
administration. Distributive and free autonomous node
causes vulnerabilities to Denial of Service (DOS) attacks.
Denial of service is any type of attack where the attacker
attempt to prevent legitimate users from accessing the
service. A Denial of service attack is when a attackeristrying
to generate more traffic than you have resources to handle.
Some security attacks are shown in Table 1., below are syn
flood, black hole, sink hole, jellyfish attack etc...
Table -1: Security attacks in MANET
Security
attacks
Description
Syn flood Is a type of DOS attack in which an attacker
sends a series of SYN requests to target’s
system in an attempt to use vast amounts of
server resources to make the system
unresponsive to legitimate traffic
Black hole
attack
Is a problem that one malicious node utilizes
the routing protocol to claim itself of being
the shortest path to the destination node, but
drops the routing packets but does not
forward packets to its neighbours
Sink hole
attack
Isthe type of attack were compromised node
triesto attract network traffic byadvertiseits
fake routing update.
This paper describes the impact of security attacks and
different techniques to control and avoid effect of various
attacks in MANET and provide better security for secure
data transmission.
2. RELATED WORK
To reduce such malicious activity without expensive
cryptography they have given a new concept of Self Protocol
Trustiness(SPT) in which detecting a maliciousnodesandits
activity is accomplished by the normal protocol behaviour
and they have presented a Blackhole Resisting Mechanism
(BRM) here not require expensive Cryptography or
authentication mechanismsis discussed in [1]BRM_AODVis
designed to mitigate the effect of the blackhole attack on the
performance of AODV protocol by fast detectionofblackhole
neighbours. The mechanism introduces a new concept of
self-protocol trustiness (SPT) the mechanism not use
cryptographic techniques which conserves the power and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3147
computation resources. BRM-AODV gives a huge
improvement of the network performanceinallmetricsover
both AODV and SAODV. The proposedmechanismsucceeded
in detecting blackhole nodes within a short time regardless
the number of malicious node.
Based on the behaviour of nodes a mathematical theory of
evidence that is Dempster Shafer theory for calculating the
trust of nodes, this is a mathematical theory of evidence and
a theory of behavioural reasoning. The degree of trust
replace the evidence. Dumpster’s rule of grouping is theway
to aggregate and brief quantity of evidences D-S theory for
calculating trust of nodes in MANET initially, all nodes have
the same trust after that when communication start, D-S
theory apply on the behaviour of nodes so that it calculate
the trust probability of nodesin the network. Thesimulation
result using D-S theory get better result in form of packet
delivery ratio, throughput routing overhead of this work
increase because of trust calculation happen againandagain
has been observed in [2]
For protecting wireless sensor network from DOS attack
designed a new technique in [3] the main intension of this
paper is to protect WSN from DOS attack design a dynamic
forwarding window techniqueforsecuringthenetworkfrom
DOS attack. This scheme is on the basis of dynamic time, this
time is known as forwarding window and it will be
calculated in route request phase if any nodefloodstheroute
request message more than forwarding window then it will
detect as attacker. Forwarding window=Number of
neighbours*(Time at which RREQ was received-Time at
which RREQ was sent). Energy consumption is one of the
parameter impacted by flooding attack, the same parameter
showed an improvement of 7.14 percent ascompared to the
existing scheme. The Lessing of the flooding of the route
request packets tends to consume lesser amount of energy
on the part of the nodesthen preserving the majorresources
of the network namely energy consumption, this is not only
detected the malicious node but also succeeded in reducing
the damage caused to the network by such malicious nodes.
This type of attacks can be reduced by using AODV is a
reactive routing in which each node maintains a routing
table which contains the information about neighbour node
from which the packets is arrived in order to search
destination path. Experiments are performed on ns-3
simulator and calculated average End-to-End delay. Packet
delivery ratio and routing overhead using AODV routing in
the network a packet takes 0.3 milliseconds average time
from source to destination node using AODV routing and
overhead in the network happens with 83.33% when speed
of node is increased in network packet delivery ratio is
decreased due to increasing probabilityoflinkbreaksamong
nodesthe detecting technique do not guarantee of achieving
100% PDR as detection take some time duration and this
time duration packets are dropped. In [5] implemented
jellyfish attack in delay variance attack on AODV and
proposed a JFDV detection algorithm that analyzes multiple
JFDV attacker nodes it reducesaverage end-to-enddelayand
increase throughput by re-routing data packets through
alternate route consisting of malicious nodes.
Security is a major aspect in MANET, there is need to heal
performance of attack effected networks. Jellyfish delay
variance attack introduce delay in the network and leads to
decreased throughput. Detecting malicious node that
performing malicious activity is one of the major concern.
To protect the data from modification the new improved
technique is discussed in [6] for the detection of malicious
node CONFIDANT is the one of effective technique but thisis
also incorporated with some weaknesses. This paper
proposed a malicious node detection technique, called
improved CONFIDANT technique which resolvessignificant
problems of CONFIDANT techniques such as detection and
prevention of blackhole nodes, false reporting problem,
network collision aswell asproviding qualityofservice.This
solves the significant problem of watchdog technique,detect
malicious node from the innocent node. Solve the false
reporting problem and deal with maliciousnodecolluded in
MANETS, CONFIDANT technique is an effective and efficient
method to detect malicious node but is also associated with
some weakness. This proposed work trying to remove these
weaknesses and proposed a new technique improved
CONFIDANT technique this reduces the number of packets
drop and provides security against malicious nodes by
isolating them from adhoc network it also reduces the false
positive and false negative message to spread in the
network. Improved CONFIDANT technique can be
implemented to provide security against modification and
fabrication of data packets by malicious node.
The gray hole attack has two improvement stages in first
stage a malicious node exploits the AODV protocol to
advertise itself as having a valid route to the destination
node with intension of interruptingor corrupting packets in
second stage nodesdrop the interrupted packets.Eveninthe
presence of large node numbers to maintain better
performance of network is observed in [7] work about the
implementation of a mechanism for detecting gray hole
attack in MANET on AODV protocol. The aim of work is to
develop secure adhoc demand distance vector routing
protocol to detect grayhole attacks in MANET. In this work
a gray hole attack has been detected in the networkstoavoid
any dangerouscircumstance. This researchworkcarriedout
a study and analysis of AODV routing protocol with various
security threats it works for both static and mobile node,
reducesEnd-to-End delay better performanceforlargenode
number.
Also multipath algorithm can be used for the same purpose
to produce good packet delivery ratio they have proposed a
packet update scheme and even advise the elimination
scheme by discovering all malicious nodes multipath
algorithm is used results in the restoration of average count
of hops by excluding the attacker node from the original
node. OPENET simulator is used. Packet delivery ratio and
end-to-end delay decreases.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3148
To protect the data from malicious node a latest
cryptography technique is used In this work, a robust and
scalable infrastructure based security overlay is designed
over the base trust-based routing for detecting malicious
nodes and providing security services through the
established cryptographic mechanism. The proposed
security-based algorithm is enough to accommodateanduse
latest cryptographic techniques in trust based routing for
ensuring more participation through building confidence in
the network. Opportunistic networks (OppNets) are a
subclass of delay tolerant networksand are characterizedby
intermittent end-to-end connections. The scarcity in the
network and the resource constraint of devices always
restricts the use of cryptographic solutions for security
needs in the OppNets for thwarting selfishness of the nodes.
The simulation results are taken using ONE simulator and
the results confirm that the application of security overlay
above the base trust-based protocol helps in increasing the
average performance by 35%. The study through complex
networks analysis (CNA) provides a useful insight on the
impact of human mobility toward routing Algorithm used
Inter-Intra-CommunicationCNA(Complexnetworkanalysis)
here routing are utility driven whereménagesareforwarded
to the nodes with higher utility. The security overlay design
using SimBet as base routing protocol. This proposed
protocol is trust based routing protocol. it uses the
infrastructure nodes for surveillanceanddetectingmalicious
behavior. The cryptography solutions have been proposed
for providing security services in the network is discussedin
[9]. Using elliptic curve cryptography misbehaviordetection
0f mobile node communicate with each other by using two
ways one is the mobile nodes communicate directly if they
are in radio range of each other, whereas others needs the
aid of intermediate nodes to route their packets. Due to its
primary characteristics, such as wireless medium, dynamic
topology, distributed cooperation, MANETsis susceptibleto
different kindsof security attackslikeworm hole,blackhole,
rushing attack etc. In this paper use of new methodology for
intrusion-detection system named (EAACK) enhanced
adaptive acknowledgement with elliptic curve algorithm
(ECC). It is specially designed for MANETS. EAACK
Demonstrateshigher maliciousbehaviour detection ratesin
certain circumstance.ECC based digitalsignaturecanbeused
to provide cryptographic services like data integrity data,
origin authentication and non repudiation protocol used
(IDS) The results demonstrated constructive performance
against watchdog, AACK and EAACK in case of receiver
collision and limited transmission power falsemisbehaviour
report and end to end delay is discussed in[10]. The Table II,
shows the summary of various techniques used for secured
data transmission.
3.CONCLUSION
In order to provide security for different types of attacks in
the mobile ad hoc network. This paper presents the survey
for detection and prevention of various attacks using
improvised algorithms for MANET. Data privacy is a vital
problem in MANET networks still there is a need for design
and development of exclusive algorithms in MANETs.
Table -2: Summary of different techniques for secured data transmission.
Sl.
No
Name of topic Technique and
mechanisms used
Simulator
used
Description
1 Resisting black
hole attacks on
MANETs.
Self-Protocol
Trustiness(SPT).Blac
khole Resisting
Mechanism(BRM).
NS2 On both TCP and UDP traffic the mechanism succeeded in
detecting black neighbors and enhancing the network
performance for both.
BRM-AODV is designed to mitigate the effect of black hole
neighbors.
The mechanism does not use cryptographic techniques which
conserves the power and computation resources.
BRM-AODV achievesan approximatelyconstantPDRregardless
the number of malicious nodes.
BRM-APDV achieves a better PDR value than SAODV
2 Secure
Transmission of
packets Using D-S
theory for
Preventing
MANET by
Attacks.
Dempster Shafer
theory
NS-2.35 Apply D-S theory for calculating the trust of nodes.
Using this crypto approach prevent the network by passive
attacks or by using trust value find out malicious behavior of
nodes.
The D-S is a mathematical theory of evidence and a theory of
believable reasoning.
D-S apply on the behavior of nodes so that it calculate the trust
probability of nodes in network the range of probability from
[0,1].
Probability values show the malicious or non-malicious nodes.
This work packet delivery ratio gives better result as compare
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3149
to existing work.
Routing
3 Dynamic
Forwarding
Window
Technique against
DOS Attack in
WSN
Profile based
Protection
Scheme(PPS) and
Dynamic Forwarding
window technique.
NS2(NS2.35) In Forwarding window technique the attacker is detected in
route request phase and prevention will be done in route reply
phase.
In proposed technique if any node floods the route request
message more than the dynamic time then it will detect as
attacker.
The proposed work successfully detect and preventDOSattack.
The lessening of flooding tends to consume lesser amount of
energy.
Forwarding window concept has detected the malicious node
and succeeded in reducing the damage caused to network by
such malicious nodes.
4 Analysis of
Detection
Algorithm of
sinkhole Attack
and QOS on AODV
for MANET
Individual Trust
Managing
NS3 Individual trust managing technique to prevent against
sinkhole attack.
A detection technique is also analyzed for effective detection
and removal of attacker node.
Using AODV routing protocol a packet takes 0.3 milliseconds
average time from source to destination.
PDR in the presence of sink hole is 70% after introducing the
detection technique PDR is increased up to 95% average.
5 Detection and
Analysis of
Jellyfish Attack in
MANETs.
JFDV detection
algorithm
NS2 The proposed algorithmanalyzes packet delayingmisbehavior
of nodesand detect multiple JFDV attacker nodes.Onceattacker
node is detected, its address is saved in malicious list and re
routingisinitiated to preventthe attackernodefromdisturbing
the performance of network. JFDV reduces average end-to-end
delay and increases throughput by re-routing data packets
through alternate route consisting non-malicious nodes. The
proposed algorithm improves the network performance by
increasing throughput and reduced end-to-end delay.
6 Detection of
malicious node
using Improved
CONFIDANT
Technique in Ad-
hoc Networks
Improved
CONFIDANT
technique
Improved CONFIDANT technique resolves the significant
problem of CONFIDANT technique such as detection and
prevention of blackhole nodes, false reporting problem,
network collision as well as providing QOS.
Thistechnique reducesthe number of packetdropandprovides
security against malicious nodes.
It also reduces false positive and false negative messages to
spread in the network.
It provide security against modification and fabrication of data
packets by malicious node.
7 An Approach to
detect Gray hole
Attack son Mobile
ad-hoc Networks
AODV with Intrusion
Detection
system(IDS)
OPENET,NETs
im,NS3
This is capable of detecting the single & cooperative malicious
gray hole nodes.
Malicious node is isolated from the network by generating an
alarm messages which can cause an extra overhead in network
They provide a solution which can overcome the overhead of
network caused by source node that send alarm message to all
nodes about gray hole node.
The proposed solution istry to improvesnetworkperformance.
8 Hindrance and
Riddance of Gray
Hole Attack In
MANETs
Multipath
Approach
Packet Update
scheme and Gray
hole detection
algorithm
OPNET The research concerned to provide solution to the gray hole
attack by using multipath algorithm.
Improved result after elimination of Gray hole attack in the
simulation result.
Elimination takes place on the network layer by broadcasting
the information of the attacker node.
9 Cryptography-
Based
Misbehavior
Detection and
Security based
algorithm and use
latest cryptographic
technique
NS3, NS3 The main contribution of this work is the robust design of the
security overlay, which providesadoptable security depending
on the requirement of routing mechanism and backward
linkage of malicious detection through trust depreciation. the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3150
Trust Control
Mechanisms for
Opportunistic
Network system
cryptographic solutions have been proposed for providing
security services in the network.
The performance of this work depends upon the number of
infrastructure nodes.
10 Improved MANET
security
usingElliptic
Curve
Cryptography and
EAACK
EAACK with Elliptic
Curve Algorithm
NS2,NS3 Intrusion detection scheme formsa fundamental constituentof
internet safety.
The result demonstrated constructive againstwatchdog,AACK,
& EAACK.
An effort to prevent the attackers from initiating a forged
acknowledgement attacks.
Lightweight Elliptic curve algorithmfor digital signatureinthis
proposed scheme.
REFERENCES:
[1].Mohamed A. Abdelshafy, Peter J. B. King
“Resisting blackhole attacks on MANETs”, IEEE, 2016,
pp.1048-1053.
[2].Naveen Pathak, Anand Singh Bisen, Abhinav Vidwans
“Secure transmission of packets using D-S theory for
preventing MANET by attacks”, IEEE (SCOPES), 2016,
pp.2026-2030.
[3].Poonam Rolla, Manpreet kaur “Dynamic Forwarding
Window Technique against DoS Attack in WSN”, IEEE
(ICMETE), 2016, pp.212-216.
[4].ShubLakshmiAgrwal, RakhiKhandelwal, Pankaj
Sharma, SandeepKumarGupta"Analysis of detection algorith
m of Sinkhole attack & QoS on AODV for MANET"IEEE
(NGCT), 2016, pp.839-842.
[5].SakshiSachdeva,ParneetKaur“Detection and analysis of Je
llyfish attack in MANETs”, IEEE (ICICT), 2016, pp.1-5.
[6].Nirmala Devi, R.Sunitha “Detection of malicious node
using improved CONFIDANT technique in Ad-hoc Network”
IEEE (ICETECH), 2016, pp.604-610.
[7].Kusumalata Sachan, Manisha Lokhande “An approach to
detect Gray hole attacks on Mobile ad-hoc Networks” IEEE
(ICTBIG), 2016, pp.1-5.
[8].Jyoti Prabha Singh, Dinesh Goyal, Savita Shiwani, Vishal
Gaur “Hindrance and riddance of Gray Hole attack in
MANETs multipath approach”, IEEE (ICCT), 2017, pp.1-5.
[9].Sanjay K. Dhurandher, Arun Kumar, Mohammad S.
Obaidat “Cryptography Based Misbehavior Detection and
Trust Control Mechanism for Opportunistic Network
Systems”, IEEE System Journal, 2017, pp.1-12.
[10].Pranjali Deepak Nikam, Vanita Raut “ImprovedMANET
Security Using Elliptic Curve Cryptography and EAACK”,
IEEE (ICCN), 2015, pp.1125 – 1129.

More Related Content

What's hot

FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...IJCNCJournal
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
 
Distance bounding
Distance boundingDistance bounding
Distance boundingHarish Kumar
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...IRJET Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 

What's hot (20)

FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
 
Distance bounding
Distance boundingDistance bounding
Distance bounding
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Attacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A SurveyAttacks Prevention and Detection Techniques In MANET: A Survey
Attacks Prevention and Detection Techniques In MANET: A Survey
 
Grayhole
GrayholeGrayhole
Grayhole
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 

Similar to IRJET- Secure Data Transmission from Malicious Attacks: A Review

Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkIRJET Journal
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET Journal
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET Journal
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET Journal
 

Similar to IRJET- Secure Data Transmission from Malicious Attacks: A Review (20)

Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
Novel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi NetworkNovel Method to Overcome Vulnerability in Wi-Fi Network
Novel Method to Overcome Vulnerability in Wi-Fi Network
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
 
K1803036872
K1803036872K1803036872
K1803036872
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
 
20120140502009
2012014050200920120140502009
20120140502009
 
20120140502009
2012014050200920120140502009
20120140502009
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

IRJET- Secure Data Transmission from Malicious Attacks: A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3146 Secure Data Transmission from Malicious Attacks: A Review Anuradha T Department of CSE, PDA College of Engineering, Kalaburgi, Karnataka, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Secure transmission refers to the transferofdata such as confidential or propriety information over a secure channel. Many secure transmission methods require a type of encryption. Security is a main issue of the mobile ad-hoc network, because of ad-hoc property the newlynodeeasilyjoin or leave the network. While transmission from one node to another nodes establish a path with the help of intermediate nodes. Due to the mobility of nodes in the network the malicious nodes can be easily introduced in the network and the network can be compromised. Because of dynamic nature of the network it is important to maintain the security of the network. The performance of the network depends on the behaviour of the nodes. In this paper, the main focus is to study and analyse the different techniques and system proposed by the researchers for various attacks and detection for secure data transmission. Key Words: MANETs, AODV, Security attacks, Cryptography techniques. 1. INTRODUCTION Mobile Ad-hoc Network (MANET) is a self-organized wireless network of mobile nodes without any fixed infrastructure. Nodesroam through the network, causingits topology to change rapidly and unpredictably over time. New nodes can join the network, whereas at the same time other nodes leave it or just fail to connect (temporarily) because they move to a region that is not in the cover range of the network. Nodes are typically wireless devices such as PDAs, laptops or cellular phones. From the very beginning, the use of MANETs has been appealing for bothmilitary and civilian applications, especially in the last decade because of development of wireless LAN technology. Due to their inherent characteristics of dynamic topology and lack of centralized management security, MANET is vulnerable to various kinds of attacks. These include passive eavesdropping, active interfering,impersonating,anddenial- of-service. Malicious attack is one of manypossibleattacksin AODV-based MANETs. In this attack, a malicious node sends a forged route reply (RREP) packet to source node that initiates the route discovery in order to pretend to be the destination node. The standard of AODV protocol,thesource node compares the destination sequence number contained in RREP packets when a source node received multiple RREP, it judges the greatest one as the route contained in that RREP packet. In case the sequence numbers are equal,it selects the route with the smallest hop count. As the result, the data transmission will flow towardthemaliciousnodeby source node and it will be dropped. MANET is a network continuously self-configuring infrastructure-less network of mobile devices connected wirelessly that are composed of mobile devices or other mobile pieces, that can arrange themselves in various ways and operate without strict top-down network administration. Distributive and free autonomous node causes vulnerabilities to Denial of Service (DOS) attacks. Denial of service is any type of attack where the attacker attempt to prevent legitimate users from accessing the service. A Denial of service attack is when a attackeristrying to generate more traffic than you have resources to handle. Some security attacks are shown in Table 1., below are syn flood, black hole, sink hole, jellyfish attack etc... Table -1: Security attacks in MANET Security attacks Description Syn flood Is a type of DOS attack in which an attacker sends a series of SYN requests to target’s system in an attempt to use vast amounts of server resources to make the system unresponsive to legitimate traffic Black hole attack Is a problem that one malicious node utilizes the routing protocol to claim itself of being the shortest path to the destination node, but drops the routing packets but does not forward packets to its neighbours Sink hole attack Isthe type of attack were compromised node triesto attract network traffic byadvertiseits fake routing update. This paper describes the impact of security attacks and different techniques to control and avoid effect of various attacks in MANET and provide better security for secure data transmission. 2. RELATED WORK To reduce such malicious activity without expensive cryptography they have given a new concept of Self Protocol Trustiness(SPT) in which detecting a maliciousnodesandits activity is accomplished by the normal protocol behaviour and they have presented a Blackhole Resisting Mechanism (BRM) here not require expensive Cryptography or authentication mechanismsis discussed in [1]BRM_AODVis designed to mitigate the effect of the blackhole attack on the performance of AODV protocol by fast detectionofblackhole neighbours. The mechanism introduces a new concept of self-protocol trustiness (SPT) the mechanism not use cryptographic techniques which conserves the power and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3147 computation resources. BRM-AODV gives a huge improvement of the network performanceinallmetricsover both AODV and SAODV. The proposedmechanismsucceeded in detecting blackhole nodes within a short time regardless the number of malicious node. Based on the behaviour of nodes a mathematical theory of evidence that is Dempster Shafer theory for calculating the trust of nodes, this is a mathematical theory of evidence and a theory of behavioural reasoning. The degree of trust replace the evidence. Dumpster’s rule of grouping is theway to aggregate and brief quantity of evidences D-S theory for calculating trust of nodes in MANET initially, all nodes have the same trust after that when communication start, D-S theory apply on the behaviour of nodes so that it calculate the trust probability of nodesin the network. Thesimulation result using D-S theory get better result in form of packet delivery ratio, throughput routing overhead of this work increase because of trust calculation happen againandagain has been observed in [2] For protecting wireless sensor network from DOS attack designed a new technique in [3] the main intension of this paper is to protect WSN from DOS attack design a dynamic forwarding window techniqueforsecuringthenetworkfrom DOS attack. This scheme is on the basis of dynamic time, this time is known as forwarding window and it will be calculated in route request phase if any nodefloodstheroute request message more than forwarding window then it will detect as attacker. Forwarding window=Number of neighbours*(Time at which RREQ was received-Time at which RREQ was sent). Energy consumption is one of the parameter impacted by flooding attack, the same parameter showed an improvement of 7.14 percent ascompared to the existing scheme. The Lessing of the flooding of the route request packets tends to consume lesser amount of energy on the part of the nodesthen preserving the majorresources of the network namely energy consumption, this is not only detected the malicious node but also succeeded in reducing the damage caused to the network by such malicious nodes. This type of attacks can be reduced by using AODV is a reactive routing in which each node maintains a routing table which contains the information about neighbour node from which the packets is arrived in order to search destination path. Experiments are performed on ns-3 simulator and calculated average End-to-End delay. Packet delivery ratio and routing overhead using AODV routing in the network a packet takes 0.3 milliseconds average time from source to destination node using AODV routing and overhead in the network happens with 83.33% when speed of node is increased in network packet delivery ratio is decreased due to increasing probabilityoflinkbreaksamong nodesthe detecting technique do not guarantee of achieving 100% PDR as detection take some time duration and this time duration packets are dropped. In [5] implemented jellyfish attack in delay variance attack on AODV and proposed a JFDV detection algorithm that analyzes multiple JFDV attacker nodes it reducesaverage end-to-enddelayand increase throughput by re-routing data packets through alternate route consisting of malicious nodes. Security is a major aspect in MANET, there is need to heal performance of attack effected networks. Jellyfish delay variance attack introduce delay in the network and leads to decreased throughput. Detecting malicious node that performing malicious activity is one of the major concern. To protect the data from modification the new improved technique is discussed in [6] for the detection of malicious node CONFIDANT is the one of effective technique but thisis also incorporated with some weaknesses. This paper proposed a malicious node detection technique, called improved CONFIDANT technique which resolvessignificant problems of CONFIDANT techniques such as detection and prevention of blackhole nodes, false reporting problem, network collision aswell asproviding qualityofservice.This solves the significant problem of watchdog technique,detect malicious node from the innocent node. Solve the false reporting problem and deal with maliciousnodecolluded in MANETS, CONFIDANT technique is an effective and efficient method to detect malicious node but is also associated with some weakness. This proposed work trying to remove these weaknesses and proposed a new technique improved CONFIDANT technique this reduces the number of packets drop and provides security against malicious nodes by isolating them from adhoc network it also reduces the false positive and false negative message to spread in the network. Improved CONFIDANT technique can be implemented to provide security against modification and fabrication of data packets by malicious node. The gray hole attack has two improvement stages in first stage a malicious node exploits the AODV protocol to advertise itself as having a valid route to the destination node with intension of interruptingor corrupting packets in second stage nodesdrop the interrupted packets.Eveninthe presence of large node numbers to maintain better performance of network is observed in [7] work about the implementation of a mechanism for detecting gray hole attack in MANET on AODV protocol. The aim of work is to develop secure adhoc demand distance vector routing protocol to detect grayhole attacks in MANET. In this work a gray hole attack has been detected in the networkstoavoid any dangerouscircumstance. This researchworkcarriedout a study and analysis of AODV routing protocol with various security threats it works for both static and mobile node, reducesEnd-to-End delay better performanceforlargenode number. Also multipath algorithm can be used for the same purpose to produce good packet delivery ratio they have proposed a packet update scheme and even advise the elimination scheme by discovering all malicious nodes multipath algorithm is used results in the restoration of average count of hops by excluding the attacker node from the original node. OPENET simulator is used. Packet delivery ratio and end-to-end delay decreases.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3148 To protect the data from malicious node a latest cryptography technique is used In this work, a robust and scalable infrastructure based security overlay is designed over the base trust-based routing for detecting malicious nodes and providing security services through the established cryptographic mechanism. The proposed security-based algorithm is enough to accommodateanduse latest cryptographic techniques in trust based routing for ensuring more participation through building confidence in the network. Opportunistic networks (OppNets) are a subclass of delay tolerant networksand are characterizedby intermittent end-to-end connections. The scarcity in the network and the resource constraint of devices always restricts the use of cryptographic solutions for security needs in the OppNets for thwarting selfishness of the nodes. The simulation results are taken using ONE simulator and the results confirm that the application of security overlay above the base trust-based protocol helps in increasing the average performance by 35%. The study through complex networks analysis (CNA) provides a useful insight on the impact of human mobility toward routing Algorithm used Inter-Intra-CommunicationCNA(Complexnetworkanalysis) here routing are utility driven wheremĂ©nagesareforwarded to the nodes with higher utility. The security overlay design using SimBet as base routing protocol. This proposed protocol is trust based routing protocol. it uses the infrastructure nodes for surveillanceanddetectingmalicious behavior. The cryptography solutions have been proposed for providing security services in the network is discussedin [9]. Using elliptic curve cryptography misbehaviordetection 0f mobile node communicate with each other by using two ways one is the mobile nodes communicate directly if they are in radio range of each other, whereas others needs the aid of intermediate nodes to route their packets. Due to its primary characteristics, such as wireless medium, dynamic topology, distributed cooperation, MANETsis susceptibleto different kindsof security attackslikeworm hole,blackhole, rushing attack etc. In this paper use of new methodology for intrusion-detection system named (EAACK) enhanced adaptive acknowledgement with elliptic curve algorithm (ECC). It is specially designed for MANETS. EAACK Demonstrateshigher maliciousbehaviour detection ratesin certain circumstance.ECC based digitalsignaturecanbeused to provide cryptographic services like data integrity data, origin authentication and non repudiation protocol used (IDS) The results demonstrated constructive performance against watchdog, AACK and EAACK in case of receiver collision and limited transmission power falsemisbehaviour report and end to end delay is discussed in[10]. The Table II, shows the summary of various techniques used for secured data transmission. 3.CONCLUSION In order to provide security for different types of attacks in the mobile ad hoc network. This paper presents the survey for detection and prevention of various attacks using improvised algorithms for MANET. Data privacy is a vital problem in MANET networks still there is a need for design and development of exclusive algorithms in MANETs. Table -2: Summary of different techniques for secured data transmission. Sl. No Name of topic Technique and mechanisms used Simulator used Description 1 Resisting black hole attacks on MANETs. Self-Protocol Trustiness(SPT).Blac khole Resisting Mechanism(BRM). NS2 On both TCP and UDP traffic the mechanism succeeded in detecting black neighbors and enhancing the network performance for both. BRM-AODV is designed to mitigate the effect of black hole neighbors. The mechanism does not use cryptographic techniques which conserves the power and computation resources. BRM-AODV achievesan approximatelyconstantPDRregardless the number of malicious nodes. BRM-APDV achieves a better PDR value than SAODV 2 Secure Transmission of packets Using D-S theory for Preventing MANET by Attacks. Dempster Shafer theory NS-2.35 Apply D-S theory for calculating the trust of nodes. Using this crypto approach prevent the network by passive attacks or by using trust value find out malicious behavior of nodes. The D-S is a mathematical theory of evidence and a theory of believable reasoning. D-S apply on the behavior of nodes so that it calculate the trust probability of nodes in network the range of probability from [0,1]. Probability values show the malicious or non-malicious nodes. This work packet delivery ratio gives better result as compare
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3149 to existing work. Routing 3 Dynamic Forwarding Window Technique against DOS Attack in WSN Profile based Protection Scheme(PPS) and Dynamic Forwarding window technique. NS2(NS2.35) In Forwarding window technique the attacker is detected in route request phase and prevention will be done in route reply phase. In proposed technique if any node floods the route request message more than the dynamic time then it will detect as attacker. The proposed work successfully detect and preventDOSattack. The lessening of flooding tends to consume lesser amount of energy. Forwarding window concept has detected the malicious node and succeeded in reducing the damage caused to network by such malicious nodes. 4 Analysis of Detection Algorithm of sinkhole Attack and QOS on AODV for MANET Individual Trust Managing NS3 Individual trust managing technique to prevent against sinkhole attack. A detection technique is also analyzed for effective detection and removal of attacker node. Using AODV routing protocol a packet takes 0.3 milliseconds average time from source to destination. PDR in the presence of sink hole is 70% after introducing the detection technique PDR is increased up to 95% average. 5 Detection and Analysis of Jellyfish Attack in MANETs. JFDV detection algorithm NS2 The proposed algorithmanalyzes packet delayingmisbehavior of nodesand detect multiple JFDV attacker nodes.Onceattacker node is detected, its address is saved in malicious list and re routingisinitiated to preventthe attackernodefromdisturbing the performance of network. JFDV reduces average end-to-end delay and increases throughput by re-routing data packets through alternate route consisting non-malicious nodes. The proposed algorithm improves the network performance by increasing throughput and reduced end-to-end delay. 6 Detection of malicious node using Improved CONFIDANT Technique in Ad- hoc Networks Improved CONFIDANT technique Improved CONFIDANT technique resolves the significant problem of CONFIDANT technique such as detection and prevention of blackhole nodes, false reporting problem, network collision as well as providing QOS. Thistechnique reducesthe number of packetdropandprovides security against malicious nodes. It also reduces false positive and false negative messages to spread in the network. It provide security against modification and fabrication of data packets by malicious node. 7 An Approach to detect Gray hole Attack son Mobile ad-hoc Networks AODV with Intrusion Detection system(IDS) OPENET,NETs im,NS3 This is capable of detecting the single & cooperative malicious gray hole nodes. Malicious node is isolated from the network by generating an alarm messages which can cause an extra overhead in network They provide a solution which can overcome the overhead of network caused by source node that send alarm message to all nodes about gray hole node. The proposed solution istry to improvesnetworkperformance. 8 Hindrance and Riddance of Gray Hole Attack In MANETs Multipath Approach Packet Update scheme and Gray hole detection algorithm OPNET The research concerned to provide solution to the gray hole attack by using multipath algorithm. Improved result after elimination of Gray hole attack in the simulation result. Elimination takes place on the network layer by broadcasting the information of the attacker node. 9 Cryptography- Based Misbehavior Detection and Security based algorithm and use latest cryptographic technique NS3, NS3 The main contribution of this work is the robust design of the security overlay, which providesadoptable security depending on the requirement of routing mechanism and backward linkage of malicious detection through trust depreciation. the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3150 Trust Control Mechanisms for Opportunistic Network system cryptographic solutions have been proposed for providing security services in the network. The performance of this work depends upon the number of infrastructure nodes. 10 Improved MANET security usingElliptic Curve Cryptography and EAACK EAACK with Elliptic Curve Algorithm NS2,NS3 Intrusion detection scheme formsa fundamental constituentof internet safety. The result demonstrated constructive againstwatchdog,AACK, & EAACK. An effort to prevent the attackers from initiating a forged acknowledgement attacks. Lightweight Elliptic curve algorithmfor digital signatureinthis proposed scheme. REFERENCES: [1].Mohamed A. Abdelshafy, Peter J. B. King “Resisting blackhole attacks on MANETs”, IEEE, 2016, pp.1048-1053. [2].Naveen Pathak, Anand Singh Bisen, Abhinav Vidwans “Secure transmission of packets using D-S theory for preventing MANET by attacks”, IEEE (SCOPES), 2016, pp.2026-2030. [3].Poonam Rolla, Manpreet kaur “Dynamic Forwarding Window Technique against DoS Attack in WSN”, IEEE (ICMETE), 2016, pp.212-216. [4].ShubLakshmiAgrwal, RakhiKhandelwal, Pankaj Sharma, SandeepKumarGupta"Analysis of detection algorith m of Sinkhole attack & QoS on AODV for MANET"IEEE (NGCT), 2016, pp.839-842. [5].SakshiSachdeva,ParneetKaur“Detection and analysis of Je llyfish attack in MANETs”, IEEE (ICICT), 2016, pp.1-5. [6].Nirmala Devi, R.Sunitha “Detection of malicious node using improved CONFIDANT technique in Ad-hoc Network” IEEE (ICETECH), 2016, pp.604-610. [7].Kusumalata Sachan, Manisha Lokhande “An approach to detect Gray hole attacks on Mobile ad-hoc Networks” IEEE (ICTBIG), 2016, pp.1-5. [8].Jyoti Prabha Singh, Dinesh Goyal, Savita Shiwani, Vishal Gaur “Hindrance and riddance of Gray Hole attack in MANETs multipath approach”, IEEE (ICCT), 2017, pp.1-5. [9].Sanjay K. Dhurandher, Arun Kumar, Mohammad S. Obaidat “Cryptography Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems”, IEEE System Journal, 2017, pp.1-12. [10].Pranjali Deepak Nikam, Vanita Raut “ImprovedMANET Security Using Elliptic Curve Cryptography and EAACK”, IEEE (ICCN), 2015, pp.1125 – 1129.