Open Access Open Access  Restricted Access Subscription Access

Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET


Affiliations
1 Dept. of Computer Engineering, Sankalchand Patel College of Engineering, S.P. University, Visnagar, 384351, India
2 Finilite Technologies, Ahmedabad, India
 

Packet drop (grayhole/blackhole) attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this attack for improving performance of network. This article provides the packet drop attack detection and prevention using RBDR (Rank Based Data Routing) for AOMDV routing protocol. The fields of RBDR are generated with routing information and analysis behavior of network for detecting the malicious paths. The scheme is to identify the malicious paths for preventing the packet drop attack and also able to find the trusted multiple disjoint loop free routes for data delivery in MANET. The simulation is conducted in NS2 using AOMDV reactive routing protocol and analyze with packet loss delivery, average end-to-end delay and packet delivery ratio. The proposed technique can reduce the effect of packet drop attack.

Keywords

OMDV, Blackhole/Grayhole Attack, Rank Base Data Routing, Malicious Path.
User
Notifications
Font Size

  • http://en.wikipedia.org/wiki/Mobile_ad_hoc_network.
  • Packet drop attack: http://en.wikipedia.org/wiki/Packet_drop_attack
  • Mahesh K. Marina, and Samir R. Das, Ad Hoc On-Demand Multipath Distance Vector Routing, Wireless communications and mobile computing, pp. 6:969–988, (2006).
  • Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, and Ning Liu, An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network, 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 775 - 780, 20-23 (April 2010).
  • Sumaiya vhora,Rajan Patel and Nimisha Patel, Rank Base Data Routing (RBDR) Scheme using AOMDV: A Proposed Scheme for Packet Drop Attack Detection and Prevention in MANET, International Conference on Electrical, Computer and Communication Technologies, pp. 784-788, (March 2015)
  • Ming-Yang Su, Kun-Lin Chiang, and Wei-Cheng Liao, Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks, International Symposium on Parallel and Distributed Processing with Applications, pp. 162 – 167, (September 2010).
  • Po-Chun Tsou, Jian-Ming Chang, Yi-Hsuan Lin, Han-Chieh Chao, and Jiann-Liang Chen, Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs, 13th International Conference on Advanced Communication Technology (ICACT), pp. 755 – 760, (February 2011).
  • Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao, and Jiann-Liang Chen, “CBDS: A Cooperative Bait Detection Scheme to Prevent Malicious Node for MANET Based on Hybrid Defense Architecture, 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1 – 5, (March 2011).
  • Maha Abdelhaq, Sami Serhan, Raed Alsaqour, and Rosilah Hassan, A Local Intrusion Detection Routing Security over MANET Network, International Conference on Electrical Engineering and Informatics, pp. 1-6, (July 2011).
  • Myungsook Klassen, and Ning Yang, Anomaly Based Intrusion Detection in Wireless Networks UsingBayesian Classifier, IEEE 5th International Conference on Advanced Computational Intelligence (ICACI), pp. 257 - 264, (October 2012).
  • Muhammad Raza, and Syed Irfan Hyder, A Forced Routing Information Modification Model for Preventing Black Hole Attacks in Wireless Ad Hoc Network, Proceedings on 9th International Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, pp. 418 - 422, (January 2012).
  • Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, and Arjun Agrawal, Detection and Removal of Co-operative Blackhole and Grayhole Attacks in MANETs, International Conference on System Engineering and Technology, pp. 1 - 5, (September 2012).
  • Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, and Issa Traore, Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks, Springer-Verlag Berlin Heidelberg, pp. 308-323,( October 2013).
  • Khalil I. Ghathwan, and Abdul Razak B. Yaakub, An Artificial Intelligence Technique for Prevent Black Hole Attacks in MANET, Springer International Publishing Switzerland, pp. 121-131, (June 2014).
  • Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala, A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad-hoc Networks, Second International Conference on Advanced Computing & Communication Technologies, pp. 556 - 560 , (January 2012).
  • Fidel Thachil, and K C Shet, A trust based approach for AODV protocol to mitigate black hole attack in MANET, International Conference on Computing Sciences, pp. 281 – 285, (September 2012).
  • Saurabh Gupta, Subrat Kar, and S Dharmaraja, BAAP: Blackhole Attack Avoidance Protocol for Wireless Network, International Conference on Computer & Communication Technology (ICCCT), (November 2011).
  • Meenakshi Patel, and Sanjay Sharma, Detection of Malicious Attack in MANET A Behavioral Approach, 3rd International Conference Advance Computing, pp. 388 – 393, (February 2013).
  • Bhavna Sharma, Shaila Chugh, and Vismay Jain, Energy Efficient Load Balancing Approach to Improve AOMDV Routing in MANET, Fourth International Conference on Communication Systems and Network Technologies, pp. 187 – 192, (April 2014).
  • Hitesh Gupta, Shivshakti Shrivastav, and Sanjana Sharma, Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing, 5th International Conference on Computational Intelligence and Communication Networks, pp. 380 – 384, (September 2013).
  • Jyoti Rani, and Naresh Kumar, Improving AOMDV Protocol for Black Hole Detection in Mobile Ad hoc Network, International Conference on Control, Computing, Communication and Materials (ICCCCM), pp. 1-8, (August 2013).
  • K.S.Sujatha, Vydeki Dharmar, and R.S.Bhuvaneswaran, Design of Genetic Algorithm based IDS for MANET, International Conference on Recent Trends in Information Technology (ICRTIT) pp. 28 – 33, (April 2012).
  • Monita Wahengbam, and Ningrinla Marchang, Intrusion Detection in MANET using Fuzzy Logic, Emerging Trends and Applications in Computer Science (NCETACS) 3rd National Conference, pp. 189 – 192, (March 2012).
  • Pramod Kumar Singh, and Govind Sharma, An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET, 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 902 – 906, (June 2012).
  • Sonali P. Botkar, and Shubhangi R. Chaudhary, An Enhanced Intrusion detection System using Adaptive Acknowledgment based Algorithm, Information and Communication Technologies (WICT) World Congress, pp. 606 – 611, (December 2011).
  • Yibeltal Fantahun Alem, and Zhao Cheng Xuan, Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection, Future Computer and Communication (ICFCC) 2nd International Conference, pp. V3-672 - V3-676, (May 2010).
  • L Latha Tamilselvan, and V. Sankaranarayanan, Prevention of Blackhole Attack in MANET,” 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, (August 2007).
  • Patel Rajankumar, Patel Nimisha, and Pariza Kamboj, A Comparative Study and Simulation of AODV MENET Routing Protocol in NS2 & NS3, IEEE International Conference on Computing for Sustainable Global Development (INDIACom), pp.889-894, (March 2014).

Abstract Views: 334

PDF Views: 10




  • Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET

Abstract Views: 334  |  PDF Views: 10

Authors

Rajan Patel
Dept. of Computer Engineering, Sankalchand Patel College of Engineering, S.P. University, Visnagar, 384351, India
Sumaiya Vhora
Finilite Technologies, Ahmedabad, India
Nimisha Patel
Dept. of Computer Engineering, Sankalchand Patel College of Engineering, S.P. University, Visnagar, 384351, India

Abstract


Packet drop (grayhole/blackhole) attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this attack for improving performance of network. This article provides the packet drop attack detection and prevention using RBDR (Rank Based Data Routing) for AOMDV routing protocol. The fields of RBDR are generated with routing information and analysis behavior of network for detecting the malicious paths. The scheme is to identify the malicious paths for preventing the packet drop attack and also able to find the trusted multiple disjoint loop free routes for data delivery in MANET. The simulation is conducted in NS2 using AOMDV reactive routing protocol and analyze with packet loss delivery, average end-to-end delay and packet delivery ratio. The proposed technique can reduce the effect of packet drop attack.

Keywords


OMDV, Blackhole/Grayhole Attack, Rank Base Data Routing, Malicious Path.

References





DOI: https://doi.org/10.13005/ojcst%2F10.01.10