Reducing Packet Dropping Attacks in Manets Using Auditor and One Hop Approach

Reducing Packet Dropping Attacks in Manets Using Auditor and One Hop Approach

Lankapalli V. RameshChettiar R. Bharathi

Department of CSE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu. &Assoc. Prof., Andhra Loyola Institute of Engineering and Technology, Vijayawada-520008, Andhra Pradesh, India

Department of ECE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, Tamil Nadu 600054, India

Corresponding Author Email: 
rameshloyolacse@gmail.com
Page: 
151-157
|
DOI: 
https://doi.org/10.18280/ama_b.610308
Received: 
2 July 2018
| |
Accepted: 
25 August 2018
| | Citation

OPEN ACCESS

Abstract: 

Mobile Ad hoc Network (MANET) is an autonomous, wireless network of mobile devices with dynamic infrastructure. Despite its wide-ranging applications, MANETs are prone to network attacks eventually leading to denial of service attack resulting in packet loss. Blame it on the basic routing protocols such is their design assuming there are no malicious nodes in the network making them vulnerable to either black hole or gray hole attacks. Detection and elimination of malicious nodes involved in the packet forwarding process, is quite a challenge. Down the ages different methods have been employed for the same such as the credit based, trust based, auditing based and end to end based each having its own drawbacks. Aimed at improving the delivery ratio of packets in the network, the proposed method combines one hop  with auditor for attack prevention and detection and watchdog mechanism can be combined with auditor node which identifies malicious nodes, so that there is a high level of security in adhoc networks. By taking an extra hop of traversal a situation is created where the malicious nodes tend to drop its own packets while the auditor tries to key out nodes which are malicious leading to its subsequent elimination.

Keywords: 

manet, detection, delivery ratio, one hop, auditor, prevention,watchdog

1. Introduction
2. Related Works
3. Proposed Method
4. Prevention & Detection Model
5. Results and Discussion
6. Conclusion
  References

[1] Perkins C, Royer E. (1999). Ad hoc on-demand distance vector routing. In Proc. of IEEE Workshop on Mobile Computing Systems and Applications 90-100.

[2] Johnson D, Maltz DA, Broch J. (2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking 139-172.

[3] Kernen J, Ott, Krkkinen T. (2009). The ONE simulator for DTN protocol evaluation. Simutools 09 Proceedings of the 2nd International Conference on Simulation Tools and Techniques.

[4] Perkins, Bhagwat P. (1994). Highly dynamic destination- sequenced distance-vector routing (DSDV) for mobile computers. In Proc. SIGCOMM 94: Computer Communications Review 234-244.

[5] Nakayama H, Kurosawa S, Jamalipour A. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology 5: 2471-2481.

[6] Sun B, Guan Y, Chen J, Pooch U. (2003). Detecting black hole attack in mobile ad hoc networks. IEEE Transactions on Vehicular Technology 490-495.

[7] Buttyan L, Hubaux JP. (2003). Stimulating cooperation in self organizing mobile ad hoc networks. ACM/Kluwer Mobile Netw. Appl 579-592.

[8] Zhong S, Chen J, Yang YR. (2003). Sprite: A simple cheat- proof, creditbased system for mobile ad-hoc networks. In Proc. IEEE INFOCOM Conf 1987- 1997.

[9] Balakrishnan K, Deng J, Varshney P. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proc. IEEE Wireless Commun. Netw. Conf 2137-2142.

[10] Liu K, Deng J, Varshney P, Balakrishnan K. (2006). An acknowledgement based approach for the detection of routing misbehavior in MANETs”. IEEE Trans. Mobile Comput 6: 536-550.

[11] Padmanabhan V, Simon DR. (2003). Secure traceroute to detect faulty or malicious routing. In Proc. ACM SIGCOMM Conf 7782.

[12] Papadimitratos P, Haas Z. (2003). Secure message transmission in mobile ad hoc networks. Ad Hoc Netw 1: 193-209.

[13] Bhalaji N, Shanmugam A. (2005). Dynamic trust based method to mitigate grayhole attack in mobile adhoc networks. International Conference on Communication Technology and System Design 881-888.

[14] MAOHmmad T, Kahvand M. (2014). Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks. 17th IEEE M editerranean Electrotechnical Conference, Beirut, Lebanon 13-16.

[15] Galuba W, Papadimitratos P, Poturalski M, Aberer K, Despotovic Z, Kellerer W. (2010). Castor: Scalable secure routing for ad hoc networks. In Proc. IEEE INFOCOM 1-9.

[16] Buchegger S, Boudec JY. (2002). Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic adhoc networks). In Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. Conf pp. 226-236.

[17] He Q, Wu D, Khosla P. (2004). Sori: A secure and objective reputationbased incentive scheme for ad hoc networks, in Proc. IEEE Wireless Commun. Netw. Conf pp. 825-830.

[18] Liu Y, Yang YR. (2003). Reputation propagation and agreement in mobile ad-hoc networks. In Proc. IEEE WCNC Conf 1510-1515.

[19] Marti S, Giuli TG, Lai K, Baker M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proc. ACM MobiCom Conf, pp. 255-265.

[20] Shu T, Krunz M. (2015). Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Transactions on Mobile Computing 4: 813-828.

[21] Shu T, Liu S, Krunz M. (2009). Secure data collection in wireless sensor networks using randomized dispersive routes. In Proc. IEEE INFOCOM Conf., pp. 2846–28508