Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(164.37KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS
G. S. Mamatha, S. C. Sharma
Pages - 275 - 284     |    Revised - 30-06-2010     |    Published - 10-08-2010
Volume - 4   Issue - 3    |    Publication Date - July 2010  Table of Contents
MORE INFORMATION
KEYWORDS
MANET, Robust, malicious nodes, semantic security
ABSTRACT
A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a mobile ad hoc network (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers. The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing attacks. Several countermeasures have been proposed for these routing attacks in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the different MANET constraints and also is robust in nature, since it is able to identify and prevent four routing attacks parallelly. The experimental analysis shows the identification and prevention of the four attacks parallelly I.e., packet dropping, message tampering, black hole attack and gray hole attack
CITED BY (21)  
1 Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
2 Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18.
3 Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs.
4 Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
5 Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks.
6 Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks.
7 Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE.
8 Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET.
9 Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume.
10 Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1).
11 Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA).
12 Tiwari, A., & Verma, N. A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED.
13 Kartheesn, L., & Srivatsa, S. K. (2012). A policy based scheme for combined data security in mobile ad hoc networks. Journal of Computer Science, 8(8), 1397.
14 Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012, December). Comprehensive study of various DoS attacks and defense approaches in MANETs. In Emerging Trends in Science, Engineering and Technology (INCOSET), 2012 International Conference on (pp. 25-31). IEEE.
15 Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In Advances in Communication, Network, and Computing (pp. 60-67). Springer Berlin Heidelberg.
16 Shin, S. Y., & Halim, E. H. (2012, October). Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In ICT Convergence (ICTC), 2012 International Conference on (pp. 781-786). IEEE.
17 Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1-12.
18 Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). A novel approach for grayhole and blackhole attacks in mobile ad hoc networks. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 556-560). IEEE.
19 Aarti, P. R. Nav view search.
20 Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE.
21 Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET).
1 Google Scholar 
2 Academic Journals Database 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
1 Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Attacks in Mobile Ad hoc Networks”. International Journal of Computer Science and Security, 2(3):18-29, 2008
2 Bingwen He, Joakim Hägglund and Qing Gu. “Security in Adhoc Networks”, An essay produced for the course Secure Computer Systems HT2005 (1DT658), 2005
3 IEEE Std. 802.11. “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, 1997
4 Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung. “WAP: Wormhole Attack Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008
5 Moumita Deb, “A Cooperative Black hole Node Detection Mechanism for ADHOC Networks”, Proceedings of the World Congress on Engineering and Computer Science, 2008
6 Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal and Ajith Abraham. “A Distributed Security Scheme for Ad Hoc Networks”, ACM Publications, Vol-11, Issue 1, pp.5–5, 2004
7 Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”. Journal of Internet Engineering, 2:1, 2008
8 Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah. “A Survey on MANET Intrusion Detection”. International Journal of Computer Science and Security, 2(1):1-11, 1999
9 Frank Kargl, Andreas Klenk, Stefan Schlott and Michael Weber. “Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks”, In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, 2002
10 Murali Kodialam, T. V. Lakshman. “Detecting Network Intrusions via Sampling: A Game Theoretic Approach”, In Proceedings of IEEE INFOCOM, 2003
11 Patcha, A; Mishra, A. “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, In Proceedings of Radio and Wireless conference, RAWCON apos; 03, Vol. 10, Issue 13, pp. 75–78, Aug 2003
12 N. Song, L. Qian and X. Li. “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach”, In proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, 2005
13 Nasser, N, Yunfeng Chen. “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks”, In proceedings of IEEE International Conference on Communications, ICC apos; Vol-07 , Issue 24-28, pp.1154 – 1159, June 2007
14 S.Dhanalakshmi, Dr.M.Rajaram. “A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”, IJCSNS International Journal of Computer Science and Network Security, 8(10), October 2008
15 Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang and Mei-Chun Chou. “Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks”, In Proceedings of 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008, AINAW March 2008
16 Yi, Ping Wu, Yue Li and Jianhua. “Malicious node detection in Ad Hoc networks using timed automata”, In Proceedings of IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07), Shangai, China, 2007
17 Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika. "Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks", In Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447-450, 2009
18 Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, 2:54-59, 2009
19 Malcolm Parsons, Peter Ebinger. “Performance Evaluation of the Impact of AttacksOn Mobile Ad hoc Networks”, In Proceedings of Field Failure Data Analysis Workshop
20 IEEE Std. 802.11i/D30. “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security”, 2002
21 S. Yi, P. Naldurg and R. Kravets. “Security-Aware Ad Hoc Routing for Wireless Networks”, In Proceedings of ACM MOBIHOC 2001, pp.299-302, October 2001
22 H. Deng, W. Li and D. P. Agrawal. “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, 40(10):70-75, October 2002
23 T.V.P.Sundararajan, Dr.A.Shanmugam. “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security, 3(2):62-75, April 2009
Mr. G. S. Mamatha
R.V. College of Engineering - India
mamatha.niranjan@gmail.com
Dr. S. C. Sharma
- India