Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
In present-day, technology is moving towards Mobile Ad-hoc Networks (MANET), which creates temporary network in environments that have no previous network infrastructure. 3D Mobile Collaborative Virtual Environments (3D MCVEs) to support emergency preparedness scenario such as security sensitive operations (firefighter, biological attacks ) and military training, have made a considerable impact on both commercial and academic fields over the last few years. In such systems, users will share a 3D virtual environment through their mobile devices in order to accomplish specific missions. Effective data management is vital due to the massive amount of data that need to be exchanged and displayed. When the mobile devices resource capabilities are smaller than the 3D virtual environment, we need an efficient approach to maintain and manage active data in the device memory. Traditional data management schemas become inadequate when applied in mobile environment, because it is important to guarantee the existence of the VE even when many users leave suddenly the virtual environment with critical data such as (3D geometric data, score credits etc...). To meet this challenge, we propose a novel approach using decision-based mobile agent that enables nodes to autonomously make intelligent decision about data computation and node state in the network. The resulting approach limits the damage of application interest and offers a realistic virtual environment. We also provide an example of how this approach can be implemented in a real-life emergency preparedness scenario.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
In present-day, technology is moving towards Mobile Ad-hoc Networks (MANET), which creates temporary network in environments that have no previous network infrastructure. 3D Mobile Collaborative Virtual Environments (3D MCVEs) to support emergency preparedness scenario such as security sensitive operations (firefighter, biological attacks ) and military training, have made a considerable impact on both commercial and academic fields over the last few years. In such systems, users will share a 3D virtual environment through their mobile devices in order to accomplish specific missions. Effective data management is vital due to the massive amount of data that need to be exchanged and displayed. When the mobile devices resource capabilities are smaller than the 3D virtual environment, we need an efficient approach to maintain and manage active data in the device memory. Traditional data management schemas become inadequate when applied in mobile environment, because it is important to guarantee the existence of the VE even when many users leave suddenly the virtual environment with critical data such as (3D geometric data, score credits etc...). To meet this challenge, we propose a novel approach using decision-based mobile agent that enables nodes to autonomously make intelligent decision about data computation and node state in the network. The resulting approach limits the damage of application interest and offers a realistic virtual environment. We also provide an example of how this approach can be implemented in a real-life emergency preparedness scenario.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Security threats in manets a review
1. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
DOI : 10.5121/ijit.2014.3204 37
SECURITY THREATS IN MANETS: A REVIEW
Shikha Jain
Department of Computer Science, Delhi University, New Delhi, India
ABSTRACT
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
KEYWORDS
Network Protocols, Wireless Network, Mobile Network, Ad-hoc Networks, Routing Protocols, Security, and
Attackers.
1. INTRODUCTION
Ad hoc Networks are the networks formed for a particular purpose. These networks assume that
an end to end path between the nodes exists. They are often created on-the-fly and for one-time or
temporary use. They find their use in special applications like military, disaster relief etc that are
in a need of forming a new infrastructure less network with all pre-existing infrastructure being
destroyed. Characteristics of Ad hoc networks include:
1) Lack of fixed infrastructure: An ad-hoc network is a collection of nodes that do not rely on
pre-existing infrastructure for their connectivity. So these types of networks are flexible and
easily reconfigurable.
2) Limited resources: Due to lack of fixed infrastructures, these networks have limited resources
for their use. Resources like battery power, bandwidth, computation power, memory etc have
to be used judiciously for the survival and proper functioning of the network.
3) Dynamic Topology: Nodes in the ad hoc networks are often mobile wireless devices like
laptops, PDAs, smart-phones etc resulting in frequent change of their location, resulting in a
dynamic topology.
4) Autonomous Networks i.e. stand-alone self-organized system: Due to their decentralized
nature, these networks eliminate the complexities of infrastructure setup, enabling devices to
create and join networks "on the fly" anywhere, anytime, for any application. A node in the
ad hoc networks can communicate with all other nodes which are in its transmission range.
Nodes in the network are self-sufficient for the purposes like routing application messages,
assuring security of the network and so on.
5) Cost effective: All the above described features make these networks cost effective by
removing the necessity of servers, cables for internet connectivity, routers etc.
2. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
38
Figure 1 : An Example of Ad Hoc Networks
An example of ad hoc networks is shown in Figure.1. Here ad hoc network is being established
by communication between wireless mobile nodes A, B, C, D, E, F and G. Node A wants to send
a message to another node E in the network. Routing in the network for such a scenario takes
place through multiple intermediate relay hops present in between A and E, assuming that all
nodes in the network are trustworthy. Since A and B are in the wireless range of each other, A
sends the message to B, B and C are in range of each other so message will get passed to C and so
on till the message finally reaches E via the path A, B, C, G and E.
The organization of this paper is as follows. Section II explores the various routing protocols in
ad-hoc networks. Section III highlights the various security issues involved. Network attacks are
categorized in Section IV. Section V presents the various routing attacks. Section VI concludes
the paper.
2. ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS (MANETS)
The main goal of routing protocols in ad hoc networks is to find out the optimal path with
minimum overhead, minimum bandwidth consumption and minimum delay between the source
and the destination node. As most of the nodes in ad hoc networks are wireless mobile nodes, the
topology of such type of a network does not remain fixed. As a result, it becomes the node's
responsibility to regularly discover the network topology in order to route the messages properly.
Therefore, there is a need for various routing protocols to discover an optimal path from the
source to the destination. A single routing protocol cannot work optimally in different network
scenarios. A need is therefore felt for an appropriate protocol selection taking in consideration
different network parameters such as density, size and the mobility of the nodes.
On the basis of the network topology, the routing protocols in MANETS are broadly categorized
as Proactive Routing Protocols, Reactive Routing Protocols and Hybrid Routing Protocols which
are discussed as follows:
1. Proactive Routing Protocols - In the proactive routing protocols, routing is done using the
information present in routing tables maintained at each node i.e. table driven routing. These
tables are exchanged on a periodic basis between the nodes. Each entry in the table contains the
3. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
39
information of the next hop for reaching to a node or subnet and the cost of this route. Since
information of the neighboring nodes is maintained at each node, the time for route selection
becomes minimal.
Following are the problems from which pro-active routing algorithms suffer:
a) Dynamic topology of the network results in some frequent changes in the routing table
resulting in invalid routes as the new routes cannot be updated very frequently. As a result, there
is a slow reaction on restructuring and hence, the failures of links.
b) Increase in network size results in increase in size of routing table which in turn increases the
network load while updating or exchanging tables.
Scenarios for which these types of protocols are best suited are:
i) Lesser node mobility
ii) Lesser density or fewer nodes
iii) Small sized networks.
Various pro-active routing algorithms are Optimized Link State Routing (OLSR) [10], Landmark
Routing Protocol (LANMAR) [11], Topology Broadcast based on Reverse Path Forwarding
(TBRPF) [12] etc.
2. Reactive Routing Protocols - In case of Reactive Routing protocols, the routing is done
by the nodes only on demand i.e. only when the node needs to send a message. The sender floods
its neighbors with Route Request (RREQ) packets to find route in the network. Any
destination/intermediate node in the network having path to the destination will reply back with
Route Reply (RREP) to the sender and the routing is accomplished.
These suffer from following disadvantages:
a) There is a time delay in finding the routes since a large number of control packets have to be
exchanged before the exchange of actual data.
b) Network congestion may result due to excessive flooding of packets.
Reactive Routing find their applications in the following network scenarios:
i) High mobility networks.
ii) Medium size networks.Various Reactive routing algorithms are Ad Hoc On-Demand Distance-
Vector (AODV)[13], Dynamic MANET On Demand (DYMO)[14], Admission Control enabled
On demand Routing (ACOR)[15].
3. Hybrid Routing Protocols - Hybrid Routing Protocols takes the advantage of both
reactive and pro-active routing algorithms. In the initial stages, the nodes identify the routes using
some pro-active algorithms and later on uses reactive algorithms for on demand routing. Both
pro-active and reactive nature of the protocol can be used interchangeably depending on the
different network scenarios. Since neither pure proactive nor the reactive approach can alone
handle all the network requirements, so the hybrid approach may be in general the optimal choice.
The main disadvantages of such algorithms are:
i) Number of activated nodes determines the advantage that can be taken
ii) Reaction to the traffic demand depends on the gradient of traffic volume.
Various Hybrid routing algorithms are Zone Routing Protocol (ZRP) [17], Zone-Based
Hierarchical Link State (ZHLS) [16], etc.
4. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
40
4. SECURITY ISSUES
The MANETS set new challenges for network security and the need of an hour is to pay more
attention to the security threats posed on the network. Following are the concerned issues in
security of ad hoc networks:
1. Nodes Acting as Routers: As nodes themselves are participating in relaying of messages,
any malicious node in the network can easily misuse the message traffic either by
dropping messages or by generating false messages etc.
2. Limited Resources: Due to the limitation of network resources in mobile ad hoc
networks, the various cryptographic solutions applicable to wired networks are not
directly applicable. Therefore there is a need for new security solutions which can find
their application in this challenging domain.
3. Mobility of Nodes: Dynamically changing network topology results in more opportunities
for the malicious nodes to attack.
4. Location of Nodes: Since Ad hoc networks are formed for a purpose, the deployment
environment may not be very security sensitive. For Example, the nodes deployed in the
battlefield or in the forests for tracking wild animals etc. may invite many security threats
and attacks.
5. Wireless Medium: Interoperability is very easy in a wireless medium. Therefore, there is
a lack of privacy and the important messages can be eavesdropped and modified easily.
Some basic security constraints that must be considered and implemented in Wireless ad hoc
networks are:
1) Confidentiality: Confidentiality in the network must be implemented to prevent the
disclosure of any part of the information to unauthorized entities during the transmission
of data. Certain sensitive applications of ad hoc networks may face devastating
consequences if confidentiality is not taken care of.
2) Integrity: Integrity is violated when a message is actively modified in transit. The
network should be able to maintain the integrity so that the unauthorized entities are not
able to modify/corrupt any message.
3) Availability: The main purpose for formation of any network is to exchange information.
This network security constraint ensures the data availability in the network. This
constraint can be violated by the denial of service attacks (DoS) in the ad hoc networks.
4) Authenticity: Authenticity ensures that a node is a genuine or trusted node in the network.
Without authentication any malicious node can deceive a genuine node and thus can have
an access to the confidential information.
Non-repudiation: Non-repudiation ensures that no node can refuse the action that it has performed
i.e. each node take the responsibility of its actions. This property of the network allows the faulty
node detection and hence helps in its isolation from the network. For e.g. when a node X receives
a message with its integrity constraint violated from another node Y then X can declare Y as a
malicious node.
5. CATEGORIZING NETWORK ATTACKS
Attacks on the ad hoc networks can be broadly categorized as Passive Attacks and Active
Attacks.
1. Passive Attacks - The main aim of passive attackers is to steal the valuable information
from the targeted networks. Attackers do not disturb the normal network functioning like
inducing false packets or dropping packets. They simply become a part of the network but
5. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
41
continuously keeps an eye on the network traffic thus in turn violating the message confidentiality
constraint. Since they do not initiate any malicious activity to disrupt the normal functioning of
the network, it becomes very difficult to identify such attacks. Examples of such types of attacks
are traffic analysis, traffic monitoring and eavesdropping.
2. Active Attacks - Active attackers tamper with the network traffic like cause congestion,
propagation of incorrect routing information etc. Due to their active participation, their
detection and prevention can be done using suitable prevention algorithms. Examples of passive
attacks include modification attack, impersonation, fabrication and message replay.
Attacks can also be classified depending upon the position of the attacker in the network.
1 External attacks
External Attacks are the attacks made by the unauthorized nodes which are not a part of the
network. External attackers can flood bogus packets in the network, impersonation etc. Their aim
can be to cause congestion or to disrupt normal network functioning.
2 Internal attacks
Internal Attacks are caused by the authorized nodes in the network. The reason for their malicious
behavior may be the following:
a) Hijacking those (authorized) nodes by some external attacker and then using them for
launching internal attacks in the network.
b) Selfishness to save their limited resources like battery power, processing capabilities, and the
communication bandwidth and exploiting other nodes for their benefit.
6. ROUTING ATTACKS
5.1. Flooding Attack
It is the basic form of Denial of Service (DoS). The aim of this attack is to paralyze the whole
network by exhausting network resources like bandwidth of the network, battery of nodes. Radio
jamming and battery exhaustion methods are the tools to conduct this attack in the network. It can
be caused in some of the following ways:
1. Attackers may initiate massive bogus route request (RREQ) packets that will definitely be
rebroadcast on and on by other nodes. Bogus may be in the sense that the destination address does
not exist in the network. As there will not be any reply for these RREQs, network will be flooded
leading to the consumption of battery power and bandwidth of all nodes. For example, consider a
simple network scenario shown in Figure 2. Here node D generates RREQ packets destined to
the node address H, which is actually not present in the network and broadcast it to all
neighboring nodes(C, G and E) in the network. Since no neighbor node will be able to find H,
they will again rebroadcast it assuming that some other nodes may be able to find the path to
1. H. In this way battery power and bandwidth are being wasted without doing any useful
work with RREQ flooding.
6. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
42
Figure 2 : Example of Flooding Attack
2. Analogous to RREQ flooding, a malicious node can do data flooding also. In this
technique after setting path to all the nodes, attacker node sends useless data packets to them.
Detection of flooding attack can be done in following ways:
The detection of any attack can be performed with the cooperation of genuine nodes in
the network. For detecting the presence of a malicious node responsible for RREQ flooding in the
network, rate of packet (or RREQ) generation of any node should be checked by the neighboring
nodes. If the rate exceeds some threshold value (set either statically or dynamically by the
algorithm) that node should be put into the blacklist and this information should be broadcasted in
the network as proposed in [2, 3, 4, and 5].
Similarly for the prevention of data flooding, a threshold for data rate generation by any
node in the network is to be set and should be checked periodically for all the neighboring nodes
in the network as proposed in [6].
Some of the recent approaches that solve this attack are presented as follows:
In [6], authors have proposed solutions for both the types of flooding (RREQ flooding and data
flooding). They categorized all system nodes as strangers, acquaintances and friends depending
on the trust level which is calculated using various parameters like association length, ratio of the
number of packets forwarded successfully by the neighbor to the total number of packets sent to
that neighbor, ratio of number of packets received intact from the neighbor to the total number of
received packets from that node, etc. The trust relation between the above categorized nodes is as
follows: Trust threshold (friend) > Trust threshold (acquaintance) > Trust threshold (Stranger).
For the prevention of RREQ and data flooding, different thresholds are being set for different
node categories like if Xrs, Xra, Xrf denotes RREQ flooding threshold for a stranger,
acquaintance and friend node respectively, then their values satisfy the given mathematical
relation Xrf > Xra > Xrs. Similarly if Yrs, Yra, Yrf denotes the DATA flooding threshold for a
stranger, acquaintance and friend node respectively then Yrf > Yra > Yrs. After reaching the
threshold level, further RREQ and data packets will not be entertained from the sending node.
Thus results in prevention from both RREQ and data flooding from the malicious nodes in the
network.
7. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
43
5.2. Sleep Deprivation Attack
Sleep deprivation attack is a type of flooding attack where either a specific node or a group of
nodes is targeted whose resources need to be exhausted. This attack can be implemented by
forcing the targeted node to use its vital resources e.g. battery, network bandwidth and computing
power by sending false requests for existent or non-existent destination nodes. In the mean time it
cannot process the requests coming from genuine nodes. The main aim of the malicious node is to
minimize the genuine nodes lifetime by wasting its valuable resources. As a result the victim
node is not able to participate in routing mechanisms and become unreachable by other nodes in
the network.
As an example, consider the network scenario in Figure 3 where a malicious node C is exhausting
the resources of node D by sending bogus data packets or bogus RREQ packets for processing.
Figure 3: Example of Sleep Deprivation Attack
Some of the proposed solutions to the sleep deprivation attack are:
1)A clustering based prevention method is proposed by Sarkar et al. in [18] which suggest the
formation of clusters in the networks as in least cluster change algorithm. It proposes that the
node with the lowest node identifier number is assigned the cluster head. The cluster head is
updated whenever two cluster heads come in direct contact. A cluster head should forward
packets for a particular source-destination pair in its cluster until a threshold value (say 10
packets) is reached. After that the cluster head breaks its connection with that node. In this way, it
results in preventing a node from sending excessive traffic.
2) Another solution as proposed by Bhattasali et al. [19] uses a hierarchy based model for the
detection of sleep deprivation attacks in sensor networks. All sensor nodes in the network are
arranged in a hierarchy of Sink gateway (SG), Cluster In-charge (CIC) having maximum energy
level and maximum degree of connectivity in the cluster, Sector Monitor which is nearest
neighbour of the CIC having maximum detective capability for an anomaly, Sector In-charge
(SIC) having maximum energy level among all neighbours of CIC and collects sensing data from
a sector) and Leaf nodes (LN) having capability to sense data.
The whole network is logically divided into clusters, headed by CIC and clusters are further
divided into sectors headed by SIC. Data collection request is initiated by the CIC and sent to the
8. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
44
SIC which forwards this request to its associated LNs. LNs in turn returns the sensed data to SIC
which forwards the collected data to the SM. SM checks for the validity or non-validity of the
collected data and sends the packets marked as valid or non-valid to the CIC. CIC takes the final
decision for preventing the rate of false positive detection. Then it forwards valid data to the SG
along with rejecting the non-valid data. Also suspected node gets added into the SG's isolation list
for future prevention.
5.3. Black hole Attack
The term “black hole” suggests a node which absorbs all information passing through it by not
forwarding it to the destination node. As a result of the dropped packets, the amount of
retransmission needed increases leading to congestion. A black hole attacker misuses the routing
protocol to tamper the normal working of the network in the following ways [7, 8]:
[1] A black hole node after receiving the RREQ packets for a particular destination sends the
route reply (RREP) packet, with modified higher sequence number to the source claiming that it
is the destination. Source after getting this pseudo RREP sends all the data to this attacker node.
[2] It can also send false RREP packet to the source to advertise that it has the shortest path
to destination. A black hole can easily intercept the packets for a particular destination. As an
example, consider Figure. 4 as a network scenario with F as a black hole attacker intercepting
packets of node E. When it receives a RREQ packet for E say from A, then it replies back to A
with a RREP packet informing that it is having shortest path to E. Now as per working of AODV
routing protocol A assumes that shortest path to E is from F and sends all the data destined for E
to F which in turn will drop those packets.
Figure 4: An Example of Black Hole Attack
Detection of black hole attack can be done in various ways. First is by overhearing the actions of
all neighbor nodes as in [8]. Authors in [20] suggest two solutions for prevention of the network
from black hole attacks which are presented as follows:
a) First algorithm finds more than one route (at least three) to the destination node. Sender
sends RREQ packets to its neighbors. All the intermediate nodes (including malicious node as
well as destination node) will reply to this pinged packet. Source then waits for receiving a
number of paths having some common intermediate nodes in between it and destination. Using
9. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
45
these shared nodes, it can confirm a safe route to the destination and transfer the buffered data
packets. If it does not get any shared nodes in between, it will wait for more route replies RREP
packets from the neighbors hoping it will get one with shared nodes soon. This approached
suffers from drawbacks like time delay in finding more routes and selecting the safest one.
Moreover no shared nodes in existing routes results in no data forwarding.
b) The second approach used in [20] ensures that each node maintains two additional tables,
one for keeping the last-packet-sequence-number of the last packet received from every node and
other is for keeping the last-packet-sequence-number of the last packet sent to each node. When
the source broadcasts a RREQ packet, all the intermediate nodes, including malicious nodes and
destination, reply with their respective RREPs containing the last-packet-sequence-number
received from the source node. By analyzing these RREPs packets, source can easily identify the
malicious nodes' reply.
Another approach used by Umaparvathi et al. in [21] proposes two tiers secure AODV
(TTSAODV) routing protocol which is an extension over AODV protocol. Basic assumption used
in this protocol is the existence of a strong symmetric key distribution among the nodes of the
network. Security is ensured in two levels of routing algorithm, first is during the route discovery
phase and second is during the data forwarding phase. In tier 1 security, the previous and the next
hop of any intermediate node, who has replied the source with the RREP packet, exchanges the
verification messages to verify that the next hop of the intermediate hop is also having the fresh
path to the destination. This ensures that the intermediate node is not a malicious node. They
claimed that proposed tier 1 security algorithm is capable of detecting all single black hole
attackers present in the network. Similarly for detecting collaborative black hole attack, tier 2
protocol is used. In this protocol, before starting the actual data transmission a number of control
messages are exchanged between source and destination. Source then waits for an
acknowledgement from the destination within a threshold time. If the acknowledgement comes
within this threshold time period, data transfer process begins assuming the path as trusted one
otherwise that particular route will be avoided for the data transfer process.
5.4. Rushing Attack
The term “rushing” suggests that the attacker will speed up to become a hop of the path to a
targeted node. This is done by forwarding RREQ quickly than the authorized nodes to increase
the probability that routes discovered will be the ones including attacker. It can thus tamper the
message traffic passing through it. This type of attack can be caused in the following ways [9]:
An attacker can enhance its forwarding speed by flooding the neighboring nodes with
bogus RREQ packets in order to slow their processing speed.
10. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
46
Figure 5: An example of Rushing Attack
Consider a scenario in Figure 5 where node A requests for the route to node E by sending RREQ
packets. Now D which is a rushing node, after getting the RREQ request engages other nearby
node G by sending bogus RREQ packets which in turn slows down the processing speed of G.
Taking advantage of that, D becomes the part of the route from A to E.
Attacker can also speed up its RREQ packets transmission by transmitting them at higher
transmission power, thus decreasing the number of hops required to reach the destination.
[9] described a set of generic mechanisms that together defend against the rushing attack
which are secure Neighbor Detection, secure Route delegation and randomized ROUTE
REQUEST forwarding.
5.5 Impersonation Attack
There is no proper authenticated mechanism to join an ad hoc network. Impersonation Attack is
caused when any adversary node joins and takes the identity of a trusted node in the network. It
then starts damaging the authentication constraint of the network. In this the attacker node uses
address (IP or MAC) of some legitimate node in the network for its outgoing packets resulting in
receiving of the messages which are for that node. Such a malicious node can also spread fake
routing knowledge and gains inappropriate access to confidential data of genuine nodes, and
becomes an authorized entity in the network.
An attacker can impersonate an authorized node as follows:
1) By guessing the identity details of the authorized node or,
2) By disabling other node’s authentication mechanism.
Consider the network scenario in Figure 6 where node D sends packets to its neighbors(C and G)
with source address as E because of which any packet coming for E through C and G will now be
directed to the malicious node D instead of E.
11. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
47
Figure 6: An Example of Impersonation Attack
SAODV [22] can be used with digital signatures to prevent impersonation attacks on
MANETS.
5.6 Routing Table Poisoning Attack
Routing Table Poisoning attacker corrupts the routing tables of other nodes in the networks
resulting in the creation of false routes, sub-optimal routes, formation of loops, and congestion in
portions of the network and also in network partitioning. This poisoning of routing tables can be
done in following ways as proposed by the authors in [1]:
Attacker broadcasts false traffic and creates bogus entries in other nodes routing tables.
An attacker generates RREQ packets with high sequence number resulting in deletion of
legitimate routes with low sequence number.
Figure 7: An Example of Routing Table Poisoning Attack
Consider the network scenario in Figure 7, where a malicious node D corrupts the routing tables
of nodes C, G and E resulting in formation of loops in the network.
12. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
48
SEAD [24] protocol utilizes a one-way hash chain to prevent malicious from increasing the
sequence number or decreasing the hop count in routing advertisement packets. Because different
hash function is used, the attacker can never forge lower metric value, or greater sequence value.
Table 1 : Various attacks, their causes and prevention
Name of the
Attack
Causes Prevention Algorithm proposed
Flooding Attack
1) By initiating
massive bogus route
request (RREQ) packets.
2) By initiating
massive data packets.
[6] Categorized all system nodes as
strangers, acquaintances and friends
depending on the trust level. After
reaching the threshold level, further
RREQ and data packets will not be
entertained from a node.
Sleep Deprivation
Attack
Implemented by forcing
the targeted node to use
its vital resources by
sending false requests
1) [18] A cluster head forwards packets
for a particular source-destination
pair in its cluster until a threshold
value (say 10 packets) is reached.
After that the cluster head breaks its
connection with that node.
2) [19] Checks for the validity or non-
validity of the collected data and
sends them marked as valid or non-
valid to the CIC. CIC takes the final
decision for preventing the rate of
false positive detection.
Black hole Attack
By sending pseudo RREP
packet with modified
higher sequence number
to the source [7, 8].
1) [20] Finds more than one route to the
destination and source then waits for
receiving a number of paths having
some common intermediate node.
2) [21] Proposes TTSAODV routing
protocol. The previous and the next
hop of any intermediate node
exchanges the verification messages
to verify the attacker.
Rushing Attack
1) An attacker enhances
its forwarding speed
of RREQs by flooding
the neighbouring
nodes [9].
2) By transmitting
RREQs at higher
transmission power
[9].
[9] described a set of generic
mechanisms that together
defend against the rushing attack which
are secure Neighbor Detection, secure
Route delegation and randomized
ROUTE REQUEST forwarding.
13. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
49
Impersonation
Attack
1) By guessing the
identity details of the
authorized node.
2) By disabling other
node’s authentication
mechanism
1) Using digital signatures with
SAODV [22] can be used.
2) ARAN [23] provides authentication
and non repudiation services using
predetermined cryptographic
certificates for end-to-end
authentication.
3) 3)
Routing Table
Poisoning Attack
1) By broadcasting false
traffic and creating
bogus entries in other
nodes routing tables
[1].
2) By generating RREQs
with high sequence
number resulting in
deletion of legitimate
routes [1].
SEAD [24] protocol utilizes a one-way
hash chain to prevent malicious from
increasing the sequence number or
decreasing the hop count in routing
advertisement packets.
6. CONCLUSION AND FUTURE WORK
This paper presented a number of popular attacks like DoS, sleep deprivation, black hole attack,
routing table poisoning attack, impersonation and rushing attacks in MANETs. In Table 1 author
had presented some of the methods to attack a network model along with some of the proposed
solutions. Various issues that need to be addressed keeping in view the security of MANETS
have also been highlighted. The need of the hour is to detect and prevent these attacks in a timely
fashion in time. In the future work, the author would like to propose an integrated security system
which will analyze the network for detecting the presence of these attacks. After detection of a
particular attack author will try to pinpoint the attacker nodes and then mitigate their affect by
excluding those nodes from the system.
REFERENCES
[1] S. Agrawal, S. Jain, and S. Sharma, “A survey of Routing Attacks and Security Measures in Mobile
Ad-Hoc Networks,” Journal of Computing, Volume 3, Issue 1, January 2011, ISSN 2151-9617.
[2] V. Balakrishnan, V. Varadharajan, U.K. Tupakula, “Fellowship: Defense Against Flooding and
Packet Drop Attacks In MANET,” Network Operations and Management Symposium, NOMS 2006,
pp. 1- 4, 2006.
[3] Y. Guo, S. Gordon, S. Perreau, “A Flow Based Detection Mechanism against Flooding Attacks in
Mobile Ad Hoc Networks,” Wireless Communications and Networking Conference, IEEE (WCNC
2007), pp.3105-3110, March 2007.
[4] S. Desilva, and R.V. Boppana, “Mitigating Malicious Control Packet Floods In Ad Hoc Networks,”
Proceedings of IEEE Wireless Communications and Networking Conference 2005, vol. -4, pp. 2112-
2117, March 2005.
[5] Y. Sasson, D. Cavin, A. Schiper, “Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc
Networks,” 2003 IEEE Wireless Communications and Networking, (WCNC 2003), New Orleans,
LA, USA, vol.2, March 202003, pp.1124-1130.
[6] Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao, “Performance Analysis of Flooding
Attack Prevention Algorithm in MANETs,” World Academy of Science, Engineering and
Technology 2009.
14. International Journal on Information Theory (IJIT), Vol.3, No.2, April 2014
50
[7] M.A. Shurman, S.M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM
Southeast Regional Conference, pp. 96-97, 2004.
[8] J. CAI, P. YI, J. CHEN, Z. WANG, N. LIU, “An Adaptive Approach to Detecting Black and Gray
Hole Attacks in Ad Hoc Network,” 2010 24th IEEE International Conference on Advanced
Information Networking and Applications (AINA),Perth, Australia, April 20-23, 2010, pp.775- 780,.
[9] Y.C. Hu, A. Perrig and D. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network
Routing Protocols,” Proceedings of the ACM Workshop on Wireless Security (WiSe), SanDiego,
California, pp. 30-40, September 2003.
[10] T.H. Clausen, G. Hansen, L. Christensen, and G. Behrmann, “The Optimized Link State Routing
Protocol, Evaluation Through Experiments and Simulation,” Proceedings of IEEE Symposium on
Wireless Personal Mobile Communications 2001, September 2001.
[11] M. Gerla, X. Hong, L. Ma and G. Pei, “Landmark Routing Protocol (LANMAR) for Large Scale Ad
Hoc Networks,” IETF Internet Draft,v.5, November 2002.
[12] R. Ogier, F. Templin and M. Lewis, “Topology Dissemination Based on Reverse-Path Forwarding
(TBRPF),” IETF Internet Draft, v.11, October 2003.
[13] C. E. Perkins and E. M. Royer, “Ad Hoc On-Demand Distance Vector Routing,” Proceedings of
IEEE Workshop on Mobile Computing Systems and Applications 1999, pp. 90-100, February 1999.
[14] I. Chakeres and C. Perkins, “Dynamic MANET On-demand (DYMO) Routing Protocol,” IETF
Internet Draft, v.15, November 2008, (Work in Progress).
[15] N. Kettaf, A. Abouaissa, T. Vuduong and P. Lorenz,”Admission Control enabled on demand Routing
(ACOR),” – http://tools.ietf.org/html/draft-kettaf-manet-acor, July 2006, (Work in progress).
[16] T. Hamma, T. Katoh, B. B. Bista, and T. Takata, “An efficient zhls routing protocol for mobile ad hoc
networks,” in DEXA ’06: Proceedings of the 17th International Conference on Database and Expert
Systems Applications. Washington, DC, USA: IEEE Computer Society, 2006, pp. 66–70.
[17] Haas and M. Perlman, "The Zone Routing Protocol (ZRP) for ad hoc networks," Internet draft,
Mobile Ad-Hoc Network (MANET) Working Group, IETF (1998).
[18] M. Sarkar, and B. D. Roy. "Prevention of sleep deprivation attacks using clustering." Electronics
Computer Technology (ICECT), 2011 3rd International Conference on. Vol. 5. IEEE, 2011.
[19] T. Bhattasali, R. Chaki, S. Sanyal, “Sleep Deprivation Attack Detection In Wireless Sensor
Network”, International Journal of Computer Applications, Vol. 40, No. 15, pp.19-25, February
2012, ISBN: 978-93- 80866-55-8, DOI:10.5120/5056-7374, published by Foundation of Computer
Science, New York, USA.
[20] M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM
Southeast Regional Conf. 2004.
[21] M. Umaparvathi, and D. K. Varughese. "Two Tier Secure AODV against Black Hole Attack in
MANETs," European Journal of Scientific Research 72.3 (2012): 369-382.
[22] Manel Guerrero Zapata. (2001) ‘Secure ad hoc on-demand distance vector routing (SAODV)’ –IETF
MANET List.
[23] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol
for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols,
2002.
[24] Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile
wireless ad hoc networks”, Ad Hoc Networks, 2003.
Author
Shikha Jain (shikhaa_88@yahoo.com) is an Assistant Professor in the Department of
Computer Science, BR Ambedkar College of the Delhi University, India. Shikha Jain
received her B.Sc. degree (First Class Hons.) in Physics from Delhi University, India
in 2008 and the M.Sc. degree from the Institute of Informatics and
Communication,University of Delhi, India in 2010. Her research Interests include
Cognitive Radio Networks, Delay Tolerant Networks, and Security in Wireless
Networks and Ad hoc Networks.