Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Defense against Collaborative Attacks in MANET


Affiliations
1 Department of CSE, National Engineering College, Kovilpatti, Tamilnadu, India
     

   Subscribe/Renew Journal


In MANET, the nodes are more vulnerable to be attacked than wired network due to its dynamic network infrastructure. These vulnerabilities are the nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been planned to exploit these vulnerabilities and disable the MANET operation by compromising the security criteria of the network can be termed as intrusion. While a system that attempts to detect such malicious action of network or compromised nodes is called Intrusion Detection System. The nodes are monitored using IDS, if any abnormal activities are occurred, and then it can able to detect different types of attack based on rule based classification. The SVM is also used to detect the attack accurately but it can be able to detect only the normal and abnormal behaviour. An Attacker can be able to affect on all the layers particularly network and MAC layer, so the attacks in the corresponding layer can be detected by using cross layer mechanism.

Keywords

AODV, Black Hole Attack, Worm Hole Attack, IDS, Cross Layer.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 211

PDF Views: 1




  • Defense against Collaborative Attacks in MANET

Abstract Views: 211  |  PDF Views: 1

Authors

K. Saroja
Department of CSE, National Engineering College, Kovilpatti, Tamilnadu, India
S. Ananthakumaran
Department of CSE, National Engineering College, Kovilpatti, Tamilnadu, India
P. Ramkumar
Department of CSE, National Engineering College, Kovilpatti, Tamilnadu, India

Abstract


In MANET, the nodes are more vulnerable to be attacked than wired network due to its dynamic network infrastructure. These vulnerabilities are the nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been planned to exploit these vulnerabilities and disable the MANET operation by compromising the security criteria of the network can be termed as intrusion. While a system that attempts to detect such malicious action of network or compromised nodes is called Intrusion Detection System. The nodes are monitored using IDS, if any abnormal activities are occurred, and then it can able to detect different types of attack based on rule based classification. The SVM is also used to detect the attack accurately but it can be able to detect only the normal and abnormal behaviour. An Attacker can be able to affect on all the layers particularly network and MAC layer, so the attacks in the corresponding layer can be detected by using cross layer mechanism.

Keywords


AODV, Black Hole Attack, Worm Hole Attack, IDS, Cross Layer.