scholarly journals Preventing Manet From Blackhole And Grayhole Attacks Using Reverse Tracing Technique

2017 ◽  
Author(s):  
Pathan Aiyaz Khan

Network which is not connected by any type of cable is a wireless network. The main purpose of using wireless network is that it enables users to avoid the cost of introducing cable lines in the building or making connection between different locations. These networks are highly affected by network attack. One of these attacks are black hole attacks in which malicious node claims that it has the fresh and shortest path. As MANET doesn't have any standard infrastructure and the dynamic topology that makes these networks highly susceptible to security flaws like exploiting vulnerabilities to routing protocols and transferring harmful packets in the networks. These security issues results in adverse effect on this network. Now the task is to prevent MANET from these security threats. As this paper is based on DSR protocol hence we developed a scheme called the Cooperative Bait Detection Scheme (CBDS), which directly focus on detection and prevention of malicious nodes introducing gray hole/black hole attacks in MANETs. To implement this CBDS we use back tracing method. Hence from our proposed system we won't require any special hardware or detection node to prevent against blackhole attacks.

Wireless Sensor Network has become one of the most emerging areas of research in recent days. WSNs have been applied in a variety of application areas such as military, traffic surveillance, environment monitoring and so on. Since WSN is not a secure network and each sensor node can be compromised by the intruder. There are plenty of security threats in sensor networks like Black hole Attack, Wormhole attack, Sinkhole attack. Recently, there are so many algorithms are proposed to detect or to prevent attack by the researchers. Still, the research is continuing to evaluate sensor nodes' trust and reputation. At present to monitor nodes’ behavior direct and indirect trust values are used and most of the detection method uses additional nodes to detect an attack. These method increases the cost and also overhead. This paper proposed a method which detects the Black hole attack without using any additional node to monitor the network. The proposed work uses Attacker Detection metric (AD metric) to detect malicious node based on the average sequence number, time delay and reliability. OLSR protocol is used for routing which improves the network lifetime by minimizing the packet flooding. Besides, to ensure reliable data transmission Elliptical Curve Digital Signature Algorithm is used. Simulation results are obtained and show malicious nodes are eliminated using AD metrics


2017 ◽  
Author(s):  
Sarvesh S. Joshi

Wireless networks are computer networks that are not connected by cables of any kind. The use of wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. Wireless networks are susceptible to many attacks. One such specific attack is a black hole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. Mobile Ad-hoc Networks (MANET) are used for communication among Mobiles and roadside equipment’s. MANET, is a form of Mobile ad-hoc network, to provide communications among nearby Mobiles and between Mobiles and nearby fixed equipment, usually described as roadside equipment. Each Mobile equipped with MANET device will be a node in the Ad-Hoc network and can receive and relay others messages through the wireless network This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Proposed system helps us in defending against the black hole attack without any requirement of hardware and special detection node.


2019 ◽  
Vol 8 (3) ◽  
pp. 8192-8198

Mobile Ad hoc Networks is configured by itself using the Mobile nodes in the Network, the maintenance also done by the wireless nodes itself. Dynamic topology, hop-to-hop communication and open-to-all are the features of MANETS, but these features made security of network highly challengeable. From security concern, routing protocols are highly vulnerable to many security threats like black hole attack. In black hole attack malicious node generates false routing information to the path requests about the route it asked for, which results all data packets forward toward it-self by the source and the black hole node manipulate its data. The cooperative black hole nodes in the other hand cooperate within the malicious nodes to fool the single black hole attack prevention algorithms. Here an approach is proposed to detecting the cooperative black holes nodes and eliminate them by broad casting there information into the network.


2013 ◽  
Vol 475-476 ◽  
pp. 925-929
Author(s):  
Jian Gang Tang

Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, wireless network brings convenience, at the same time, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. Wireless network security is not only with authentication, encryption, integrity testing and other technology-related, but also need intrusion detection systems, firewalls and other technology cooperation, so its a multi-layered problem. Not only the network administrator needs to take security measures to protect the network and comprehensive safety inspection, but also requires the users to enhance their network security awareness.


Author(s):  
Dr.Yasser A. Seleman

Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply.   As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies. Knowing security holes and contributes significantly to the wireless network is immune from attempts to infiltrate and penetration design Keywords—Protocol: Language is between computers connected via the network, in order to exchange information. If we define the language of the Protocol technology, we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages.


Author(s):  
Yaesr Khamayseh ◽  
Muneer Bani Yassein ◽  
Mai Abu-Jazoh

<div class="WordSection1"><p>Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the collected dataset, namely: the BDD-AODV and Hybrid protocols. Both protocols were built on top of the original AODV. The BDD-AODV protocol depends on the features collected for the prevention and detection of black hole attack techniques. On the other hand, the Hybrid protocol is a combination of both the MI-AODV and the proposed BDD-AODV protocols. Extensive simulation experiments were conducted to evaluate the performance of the proposed algorithms. Simulation results show that the proposed protocols improved the detection and prevention of black hole nodes, and hence, the network achieved a higher packet delivery ratio, lower dropped packets ratio, and lower overhead. However, this improvement led to a slight increase in the end-to-end delay.</p></div>


2017 ◽  
Author(s):  
Isha Bhan

Mobile ad-hoc networks (MANET) are a primary requirement for the establishment of communication. CBDS has a reverse tracking mechanism which checks all the stated issues. CBDS outperforms among nodes. The malicious nodes may lead to security concerns such as it may disrupt the routing process. Since it is a Manet, it can change its scale anytime so preventing or detecting the malicious node becomes a challenge. This paper tries to solve the issue by applying a dynamic source route mechanism which is also referred as cooperative bait detection scheme (CBDS). CBDS technique integrates the advantage of both proactive and reactive mechanisms much better than the previous mechanisms like BFTR, 2ACK.


A temporal network creates various issues which are managed by nodes, communicating with the base station. The flow of packets with different routes usually attacked by malicious nodes, such an attack is also termed as black hole attack. A novel FSAODV mechanism is proposed in this paper to prevent the information from malicious nodes by following the Ad-hoc on demand distance vector (AODV) protocol. The detection of threats due to the black hole and route enhancement is implemented using the bio-inspired algorithms. Firefly algorithm and Support Vector Machine (SVM) algorithms are developed to determine the throughput, Packet Delivery Ratio (PDR), and TDR. A comparative analysis has been done to portray the success rate of proposed work. For the comparison, research works of Ashok Koujalagi and Rushdi A. Hamamreh are considered. 33.33% enhancement has been noted in throughput with Ashok Koujalagi and74.44% with Rushdi A. Hamamreh. 21.4% enhancement has been seen in PDR with Ashok Koujalagi and 91.71% with Rushdi A. Hamamreh.


Author(s):  
Yong Chen

Learning based on cloud computing, denoted as cloud learning (CL) in short, is a disruptive innovation and a current buzzword in education. It provides a learner-centered platform that benefits learners, instructors, and education providers. However, because it requires the Internet and is built on cloud computing, CL has inherent security issues. By analyzing the benefits and the security threats inherent in CL, this chapter aims to help CL stakeholders in STEM Education (namely cloud service providers, cloud content providers, and cloud users) to better understand the security issues inherent in CL from the perspectives of confidentiality, integrity, and availability. The discussions about the risks that CL stakeholders in STEM education incur as a result of prevailing security threats and system vulnerabilities will help those stakeholders to assess the cost effectiveness of security countermeasures.


2021 ◽  
pp. 1-14
Author(s):  
Noha A. Hikal ◽  
Mahmoud Y. Shams ◽  
Hanaa Salem ◽  
Marwa M. Eid

Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value.


Sign in / Sign up

Export Citation Format

Share Document