scholarly journals A Survey on Detection of Byzantine and Resource Consumption Attacks

2017 ◽  
Author(s):  
Neha Mahajan

In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication among nodes is that the nodes should cooperate with each other. While in the presence of malicious nodes, this need might lead to the severe security concerns. Preventing MANET from such nodes has become an important and challenging security issue since most of the routing protocols are vulnerable to various types of attacks. In this paper we reviewed many research works which have focused on using either proactive or reactive defense mechanisms, intrusion detection systems, routing protocols to detect and prevent resource consumption and byzantine attacks.

Author(s):  
D. Rajalakshmi ◽  
Meena K.

A MANET (mobile ad hoc network) is a self-organized wireless network. This network is more vulnerable to security failure due to dynamic topology, infrastructure-less environment, and energy consumption. Based on this security issue, routing in MANET is very difficult in real time. In these kinds of networks, the mobility and resource constraints could lead to divide the networks and minimize the performance of the entire network. In real time it is not possible because some selfish nodes interacts with other nodes partially or may not share the data entirely. These kind of malicious or selfish nodes degrade the network performance. In this chapter, the authors proposed and implemented the effect of malicious activities in a MANETs using self-centered friendship tree routing. It's a novel replica model motivated by the social relationship. Using this technique, it detects the malicious nodes and prevents hacking issues in routing protocol in future routes.


Author(s):  
Deepak Kumar Verma ◽  
Ashwani Kush ◽  
Renu Jain

Mobile ad hoc networks are characterized by wireless medium used for communication, frequent change of topology, and non-availability of centralized control for authentication. Out of all the attributes, communication through open air poses the biggest threat to security. Absence of security implementations by the routing protocols gives opening for intrusion to malicious nodes which then operate various attacks to hinder the normal communication. Solution suggested modifies vastly used AODV protocol to exploit the unused reserved bits of RREP message for identifying the malicious nodes in the MANET. Proposed algorithm finds the neighbors of the destination through RREQ messages, identifies vindictive neighbors providing contrived DSNs of the destination.


2017 ◽  
Author(s):  
Anuj Mehta

Mobile Ad-hoc network (MANET) is a collection of self configuring, multi-hop wireless network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is more vulnerable to different types of attacks and security threats because of its characteristics. A routing protocol in a mobile Ad hoc network should be against both inside and outside attackers. Most of the routing protocols in MANETs assume that all the nodes in a network will cooperate to each other while forwarding data packets to other nodes. But intermediate nodes may cause several problems like it can deny to forward the packet, can also extract useful information from the packet or may modify the content of packet. Such nodes are referred as malicious nodes. We present a survey of the main types of routing protocols and some security threats and various detection scheme against attack.. This paper also classifies several common attacks against the ad-hoc networks routing protocols based upon the techniques that could be used by attackers to exploit routing messages.


Sign in / Sign up

Export Citation Format

Share Document