Downloads: 108 | Views: 286
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.8 / 10
ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Abstract: Providing secure communication is one of important aspects in Mobile Ad hoc Networks (MANETs). Routing between Source and destination must be secure. Routing protocols helps to transfer the packets to destination. Routing Protocols are vulnerable to collaborative black hole attacks. When malicious nodes work together, to drop the packets called collaborative attacks, Blackhole attacks completely drops the packets in MANETs and also advertise that, it has minimum shortest path to destination. We propose a mechanism, Enhanced Cooperative Bait Detection Scheme (ECBDS) for preventing Collaborative blackhole attacks in MANETs. In this mechanism, integrates features of Dynamic Source Routing (DSR) and 2ACK protocols. ECBDS scheme merges the proactive and reactive defense architecture and ensure secure data transmission using Key Distribution Scheme shuffling Algorithm. In the initial stage it uses a proactive architecture, i. e. uses a Bait id concept for the detection of malicious nodes present in the network. Upon the completion of initial stage it switches to reactive defense strategy. The scheme comprises of three steps, the bait step, suspected path detection and the Confirmation Request. The bait approach attracts the malicious node to send a reply and in the next step detects the suspected path. The last step involves the destination requesting its neighbor to confirm if the path given is secure. To secure data transmission we use key distribution shuffling algorithm scheme and encryption using Key generated by KDC. The work is implemented in Network Simulator. Comparing performance of ECBDS with DSR and 2ACK. ECBDS simulation result shows increased packet delivery ratio, throughput and reduced End to End Delay ratio
Keywords: Black hole, Bait, DSR, 2ACK, MANET
Edition: Volume 4 Issue 9, September 2015
Pages: 1148 - 1153
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 736 - 741Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks
Dr. J. Seetaram, Dr. M. Nagaraju Naik
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 86
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar