A Novel Approach to Discover Black Hole and Worm Hole Attacks in MANETs

International Journal of Mobile Computing and Application
© 2016 by SSRG - IJMCA Journal
Volume 3 Issue 2
Year of Publication : 2016
Authors : S.Kanishka, G.Karishma, M.Swetha and J.Keerthi lal
pdf
How to Cite?

S.Kanishka, G.Karishma, M.Swetha and J.Keerthi lal, "A Novel Approach to Discover Black Hole and Worm Hole Attacks in MANETs," SSRG International Journal of Mobile Computing and Application, vol. 3,  no. 2, pp. 14-17, 2016. Crossref, https://doi.org/10.14445/23939141/IJMCA-V3I3P104

Abstract:

Mobile Ad-hoc networks (MANET) are assemblies of self-organizing mobile nodes with energetic topologies and have no fixed organization. Because of their dynamic ad-hoc nature, in which indefinite device develops unprompted interactions among themselves, then networks are predominantly vulnerable to numerous security threats. Consequently it is proposed to enterprise and implement malicious node detection system to avoid black hole and worm hole attacks in MANETs. In this paper we use Cooperative bait detection scheme to perceive black hole attacks. To detect Worm hole attack as well we combined Performance Evaluation Multipath Algorithm in CBDS scheme. Worm hole attacks are distinguished using hop-count and time delay analysis from the viewpoint of users deprived of any superioratmosphere assumptions.

Keywords:

CBDS, DSR, Reverse Tracing, MANETs, Performance Evaluation Multipath algorithm.

References:

[1] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” in IEEE Wireless Communications, Oct. 2007, pp. 85–91. 
[2] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996. 
[3] FayazAhamed P et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, May- 2015, pg. 71-79 
[4] Yang H., Luo H., Ye F., Lu S. and Zhang L.: Security in mobile ad hoc networks: challenges and solutions, In IEEE Wireless Communications, vol. 11, no. 1, pp.38–47 (2004). 
[5] Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 Packet Leashes: A Defense against Worm hole Attacks in Wireless Networks, Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp. 1976-1986. 
[6] K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowl- edgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007. 
[7] Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless Pers.Commun., vol. 29, pp. 367– 388, 2004. 
[8] C. Hongsong, J. Zhenzhou, and H. Mingzeng, “A novel security agent scheme for aodv routing protocol based on thread state transition,” Asia Journal of Information Technology, vol. 5, no. 1, pp. 54–60, 2006. 
[9] Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 Packet Leashes: A Defense against Worm hole Attacks in Wireless Networks, Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp. 1976-1986. 
[10] V. Mahajan, M. Natu, A. Sethi. ,Analysis of worm hole intrusion attacks in MANETS, IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008. 
[11] L. Lazos, R. Poovendram, C. Meadows, P. Syverson, L.W. Chang, Preventing Worm hole Attacks on Wireless Ad Hoc Networks: a Graph Theoretical Approach, IEEE Communication Society, WCNC 2005