19,035 Hits in 4.6 sec

Attack Analysis and Detection for Ad Hoc Routing Protocols [chapter]

Yi-an Huang, Wenke Lee
2004 Lecture Notes in Computer Science  
Attack analysis provides a basis for designing detection models. We use both specification-based and statistical-based approaches.  ...  Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Network (MANET).  ...  Related Work Many cryptographic schemes have been proposed to secure ad hoc routing protocols. Zapata [Zap01] proposed a secure AODV protocol using asymmetric cryptography. Hu et al.  ... 
doi:10.1007/978-3-540-30143-1_7 fatcat:przx23wt3ndivgofclw645zjdy

Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)

Parul Tyagi, Deepak Dembla
2017 Egyptian Informatics Journal  
The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand) protocol to detect and tackle a particular category  ...  Keywords: Routing protocol Mobile ad hoc network (MANET) Vehicular ad hoc network (VANET) Black Hole Attack Malicious node Throughput a b s t r a c t Next-generation communication networks have become  ...  Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET).  ... 
doi:10.1016/j.eij.2016.11.003 fatcat:nvwi4scihjailbm53nk2uue344

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

Prajeet Sharma
2012 International Journal of Computer Applications  
And with these parameters and many more also we build secure IDS to detect this kind of attack and block it.  ...  MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network.  ...  RELATED WORK The new DOS attack, called Ad Hoc Flooding Attack(AHFA), can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV & DSR.  ... 
doi:10.5120/5824-8064 fatcat:ex7ptzo3tngf7d4nml5v5peb5q

Wormhole Detection and Prevention using Profile base Mechanism in MANET

Gajendra Singh, Amrita Gayakwad
2014 International Journal of Computer Applications  
In this desertion we proposed detection as well as prevention technique against wormhole attack, for detection we use profile base detection technique and get attacker node information like node number  ...  , number of attack packet, attack time etc. after that we prevent wormhole attack using neighbor trust worthy base technique and secure the mobile ad-hoc network communication, through our proposal we  ...  Gandhewar [7] , proposed Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Ad-hoc Network.  ... 
doi:10.5120/16610-6447 fatcat:yspmgkdvene2pdb653habp6jna

Improvement of AODV routing protocol based on wireless mesh networks

Guo-ping Xu, Jian-hui Liu
2010 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering  
AODVSTAT is an intrusion detection tool that performs real-time detection of attacks in mobile ad hoc networks running the AODV routing protocol.  ...  In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol are discussed.  ...  Misuse detection can perform the hop-by-hop routing used in ad hoc networks requires focused analysis of the audit data and usually produces cooperation from the nodes in the network.  ... 
doi:10.1109/cmce.2010.5610515 fatcat:7g7zpptmlffyvatncf32cfxvdy

Grayhole Attack and Prevention in Mobile Adhoc Network

Megha Arya, Yogendra Kumar Jain
2011 International Journal of Computer Applications  
General Terms To develop intrusion Detection system for Gray Hole Attack for securing routing misbehavior. To Find out M isbehavior node in mobile ad-hoc environment.  ...  Keywords Gray hole, Packet dropping, malicious node, Routing, M ANET, AODV LITERATURE REVIEW Ad-hoc On-Demand Distance Vector:-AODV [7] [9] is a very simple, efficient, and effective routing protocol for  ...  The analysis had been done through simulation using commercial and highly reliable tool like Network Simulator (NS2).The performances comparison of the four routing protocols for mobile ad hoc networks.Here  ... 
doi:10.5120/3337-4592 fatcat:cil3jcavyndozpglh27heql5wa

Study of Wormhole Attack in Mobile Ad-Hoc Network

Ashish Kr.Shrivastava, Neha Jain
2013 International Journal of Computer Applications  
The requirement for cooperation among nodes to relay every other's packets within the ad-hoc network exposes them to a wide range of security attacks.  ...  This paper presents a study on wormhole attack and its counter measures in ad-hoc wireless network, along with the future research scope.  ...  Yih-Chun Hu propose a solution to wormhole attacks for ad-hoc networks within which they present a general mechanism, known as packet leashes, for detection and, so defensive against wormhole attacks,  ... 
doi:10.5120/12795-0138 fatcat:ed2t73oxbfcepi5fx5vanrle2q

Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator [article]

H. A. Esmaili, M. R. Khalili Shoja, Hossein gharaee
2011 arXiv   pre-print
The effect of black hole attack on ad hoc network using AODV as a routing protocol will be examined in this research. Furthermore, we investigate solution for increasing security in these networks.  ...  Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole.  ...  Routing protocol in ad-hoc networks are classified into two main categories, proactive and reactive [3] .  ... 
arXiv:1104.4544v1 fatcat:p2zadwmsgje37ircufpnavt2a4

Security attacks on Routing protocols and Intrusion Detection in MANET

R.M. Chamudeeswari, Dr.P. Sumathi
2017 International Journal of Scientific Research and Management  
Mobile ad-hoc networks are vulnerable to security threats. Many Intrusion Detection Systems (IDS) have been inserted to distinguish the possible approaches in the MANET.  ...  By distribution fake routing information, provided that false link status information, and plentiful other nodes with superfluous routing traffic information.  ...  ) Reactive Routing Reactive routing protocols for mobile ad hoc networks are also called "Ondemand" routing protocols.  ... 
doi:10.18535/ijsrm/v5i9.17 fatcat:7qxcw2d3yjdebmv6qh6qz7nqqi

Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet

Neha Agrawal, Krishna Kumar, Neelam Joshi
2015 International Journal of Computer Applications  
The nodes in Mobile Ad-hoc Network(MANET) interacts with one another within the absence of any centralized authority by that the Security is the one of the major problem in MANET.  ...  result in network that put out infected packets in network that are beyond the capacity of network and apply proffer Intrusion Detection Scheme (IDS) scheme to secure the network from attacker.  ...  FUTURE WORK We simulated the Byzantine Attack in the Ad-hoc Networks and investigated its affects. In our study, we used the ondemand AODV routing protocol.  ... 
doi:10.5120/ijca2015906621 fatcat:binn6m2vbzfkfjvpc5ganoxtpu

A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks

Imeh Umoren, Ekemini Okpongkpong, Ifreke Udoeka
2022 International Journal of Information Systems and Informatics  
Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up.  ...  To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the  ...  Considering these network parameters, the system was capable of detecting the degree of severity of wormhole attack on MANET.  ... 
doi:10.47747/ijisi.v2i4.581 fatcat:46dtnohqrvdilm25idz3nftxeq

Survey on Security Issues and Secure Protocols for Manet

Indu Singh
2014 IOSR Journal of Computer Engineering  
Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes.  ...  For this basic route query broadcast that provides. Secure Routing we propose the Secure Routing Protocol (SRP) that is to be applied on extension of ZRP, DSR and IERP.  ...  The attacks prevalent on ad-hoc routing protocols can be broadly classified into passive and active attacks.  ... 
doi:10.9790/0661-16145260 fatcat:lnt54hu6czbjrc6rp2xx7hm5sq

Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET

Aparna Raj, Pankaj Kumar
2017 International Journal of Computer Applications  
Subsequently, accomplishing security objectives for mobile ad hoc network (MANET) has increased critical consideration of the scholarly world and research community in recent years.  ...  The proposed scheme is simulated using NS-2 network simulator and analysis is performed using performance metrics such as routing overhead, PDR, packet analysis etc.  ...  In ad hoc network if the nodes move on random speed then that protocol is supposes to be enhanced for communiqué. The example of reactive routing protocol is AODV routing protocol.  ... 
doi:10.5120/ijca2017914243 fatcat:g6vlnu4ydfeuniljj6rarizfdy

Detection and Prevention from Black Hole Attack in AODV Protocol for MANET

Abhilasha Sharma, Rajdeep Singh, Ghanshyam Pandey
2012 International Journal of Computer Applications  
Mobile ad hoc network is dynamic in nature and vulnerable for several attacks to be arising in it.  ...  , so that it can withstand the attack by adding an IDS_node to AODV protocol.  ...  We simulated the Black Hole Attack in the Ad-hoc Networks and investigated its affects. In our study, we used the AODV routing protocol.  ... 
doi:10.5120/7764-0837 fatcat:prnxjmainvguvbhqod3ouersji

Energy Secured Intrusion Detection System and Analysis of Attacks for Mobile Ad-Hoc Networks

Rajendra Prasad P, Department of Electronics & Communication Engineering, Sri Venkateshwara College of Engineering, Bengaluru and Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India, Shivashankar Shivashankar
2020 Journal of Communications  
In this proposed work, we aim to investigate the effect of independent attacks on dynamic source routing protocol and provide pseudo code for the different types of attacks.  ...  protocol under energy consumption, throughput, packet delivery ratio (PDR) and end-to-end delay as performance metric.  Index Terms-Mobile ad-hoc network, intrusion detection system, attacks, security  ...  ACKNOWLEDGMENT We gratefully thank Sri Venkateshwara College of and Engineering, Bengaluru and Visvesvaraya Technological University, Jnana Sangama, Belagavi-590018.  ... 
doi:10.12720/jcm.15.5.406-414 fatcat:ceqher24vjeanjhtvauv2ib6fa
« Previous Showing results 1 — 15 out of 19,035 results