Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 5
Abstract
Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Distance Vector (AODV) with minimum routing overhead and high packet delivery ratio. The proposed technique intends to detect and remove black, gray, and cooperative black hole AODV attacks depending on a mobile backbone network constructed from randomly moving regular MANET nodes based on their trust value, location, and power. The backbone network monitors regular nodes as well as each other to periodically estimate monitoring trust values which represent the reliability of each node in the network. The drop in the monitoring trust value of any node is used as a clue to its malicious behavior. The backbone network also tries to bait the malicious nodes to reply to a request for a route to fake destination address. The proposed technique uses the control packets of the AODV to exchange its control information which highly reduces the overhead. The simulation results show that the performance of the proposed technique is more secure than AODV and the other recently introduced techniques.
Authors and Affiliations
Hosny Ibrahim, Nagwa Omar, Ebram William
Recurrence Relation for Projectile Simulation Project and Game based Learning
Huge Gap has been observed on study of projectile simulation models relating it to speed of camera or frame per seconds. The objective of this paper is to explore and investigate time driven simulation models to mimic pr...
Formal Verification of a Secure Model for Building E-Learning Systems
Internet is considered as common medium for E-learning to connect several parties with each other (instructors and students) as they are supposed to be far away from each other. Both wired and wireless networks are used...
Feature Subsumption for Sentiment Classification of Dynamic Data in Social Networks using SCDDF
The analysis of opinions till now is done mostly on static data rather than on the dynamic data. Opinions may vary in time. Earlier methods concentrated on opinions expressed in an individual site. But on a given concept...
Evaluation of SIGMA and SCTPmx for High Handover Rate Vehicle
Rapid technological advance in wireless mobile communication offered Internet accessibility at anytime and anywhere including high speed wireless environment such as in high speed trains, fast moving cars etc. However, w...
Nonquadratic Lyapunov Functions for Nonlinear Takagi-Sugeno Discrete Time Uncertain Systems Analysis and Control
This paper deals with the analysis and design of the state feedback fuzzy controller for a class of discrete time Takagi -Sugeno (T-S) fuzzy uncertain systems. The adopted framework is based on the Lyapunov theory and us...