PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Improved MCBDS for defending against gray hole and black hole attacks in MANETs

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduced false-positive rate more than before and on average it dropped to zero. The proposed method employs Network Simulator-2 (NS-2) to validate the effectiveness under different scenarios. Simulation results show that improved MCBDS has same performance as CBDS in terms of throughput and end-to-end delay and as much as the presence of malicious nodes increased, improved MCBDS performs better than CBDS.
Twórcy
autor
  • Faculty of Electrical and Computer Engineering, Yazd University, Yazd, Iran
autor
  • Faculty of Electrical and Computer Engineering, Yazd University, Yazd, Iran
autor
  • Faculty of Electrical and Computer Engineering, Yazd University, Yazd, Iran
Bibliografia
  • 1. Aarti, Dr SS. "Tyagi,“Study Of Manet: Characteristics, Challenges, Application And Security Attacks”." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 252-257.
  • 2. Jhaveri, Rutvij H., Sankita J. Patel, and Devesh C. Jinwala. "DoS attacks in mobile ad hoc networks: A survey." Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on. IEEE, 2012.
  • 3. Johnson, David, Y. Hu, and D. Maltz. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. No. RFC 4728. 2007.
  • 4. Anantvalee, Tiranuch, and Jie Wu. "A survey on intrusion detection in mobile ad hoc networks." Wireless Network Security. Springer US, 2007. 159-180.
  • 5. A. Haghighi, S. Hajiramezan, and K. Mizanian, “Providing a new method to deal with th Byzantine attack in intrusion detection system with dynamic hierarchy in MANETs” (in Persian), Second National Conference on Applied Research in Computer & Information Technology. CIVILICA, 2014.
  • 6. Thachil, Fidel, and K. C. Shet. "A trust based approach for AODV protocol to mitigate black hole attack in MANET." Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.
  • 7. Bhalaji, N., et al. "Trust based strategy to resist collaborative blackhole attack in MANET." Information Processing and Management. Springer Berlin Heidelberg, 2010. 468-474.
  • 8. Marchang, Ningrinla, and Rohit Datta. "Light-weight trust-based routing protocol for mobile ad hoc networks." Information Security, IET 6.2 (2012): 77-83.
  • 9. Aggarwal, Akshai, et al. "Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs." Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, 2014.
  • 10. A. Haghighi, K. Mizanian, and G. Mirjalily, “Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs.” IEEE 2015, 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI). IEEE(forthcoming), 2015.
  • 11. Chang, Jian-Ming, et al. "Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach." Systems Journal, IEEE 9.1 (2015): 65-75.
  • 12. Baadache, Abderrahmane, and Ali Belmehdi. "Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks." arXiv preprint arXiv:1002.1681 (2010).
  • 13. Liu, Kejun, et al. "An acknowledgment-based approach for the detection of routing misbehavior in MANETs." Mobile Computing, IEEE Transactions on 6.5 (2007): 536-550.
  • 14. Kozma, William, and Loukas Lazos. "REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits." Proceedings of the second ACM conference on Wireless network security. ACM, 2009.
  • 15. Wang, Weichao, Bharat Bhargava, and Mark Linderman. "Defending against collaborative packet drop attacks on manets." 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009)(in Conjunction with IEEE SRDS 2009), New York, USA. Vol. 27. 2009.
  • 16. Ramaswamy, Sanjay, et al. "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks." international conference on wireless networks. Vol. 2003. 2003.
  • 17. Bindra, Gundeep Singh, et al. "Detection and removal of co-operative blackhole and grayhole attacks in MANETs." System Engineering and Technology (ICSET), 2012 International Conference on. IEEE, 2012.
  • 18. Hiremani, Vani, and Manisha Madhukar Jadhao. "Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET." Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on. IEEE, 2013.
  • 19. Jhaveri, Rutvij H. "MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs." Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on. IEEE, 2013.
  • 20. Jhaveri, Rutvij H., Sankita J. Patel, and Devesh C. Jinwala. "A novel solution for grayhole attack in aodv based manets." Advances in Communication, Network, and Computing. Springer Berlin Heidelberg, 2012. 60-67.
  • 21. Jhaveri, Rutvij H., Sankita J. Patel, and Devesh C. Jinwala. "A novel solution for grayhole attack in aodv based manets." Advances in Communication, Network, and Computing. Springer Berlin Heidelberg, 2012. 60-67.
  • 22. Mohanapriya, M., and Ilango Krishnamurthi. "Modified DSR protocol for detection and removal of selective black hole attack in MANET." Computers & Electrical Engineering 40.2 (2014): 530-538.
  • 23. Chang, Jian-Ming, et al. "CBDS: a cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture." Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE, 2011.
  • 24. “The Network Simulator - ns-2.” [Online]. Available: http://www.isi.edu/nsnam/ns/. [Accessed: 31-Dec-2014].
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-9c25ed8c-9fca-4ed6-9353-eb46ffe88077
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.