A survey on Selfishness and Countermeasure in MANET

Purushottam Patel, Rupali Soni

Abstract


— Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases the performance. On demand routing such as AODV is more popular then proactive routing use flooding to discover route. Attackers used this concept to launch DoS attack like flooding; black hole and gray hole are the known attack in MANET. In this article we have presented a descriptive surveyed on the MANET attacks specially attacks blows on route discovery phase. Finally this paper presents a proposed methodology to detect and restrict the selfishness using the support vector machine with threshold mechanism. The behavior is the key point to classify the characteristics of a node.  Our proposed scheme will be implemented on NS-3 test bed.


Keywords


AODV ,Black hole, Gray hole, Flooding, MANET, NS-3, , Selfish Node, SVM.

References


P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, 2003.

John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee “Opening the Pandora’s Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attack”, Elsevier Computer Communications 31 (2008) 3178–318. Available at ScienceDirect.

Basangi, S., Conti, M., Giordano, S. and Stojmenovic, I. 2004. Mobile ad hoc networking. IEEE Press. Wiley-Interscience. P-282.

Alokparna Bandyopadhyay, Satyanarayana Vuppala and Prasenjit Choudhury “IEEE, Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2nd International Conference,2011

Mohammad Rafiqul Alam and King Sun Chan “RTT-TC: A Topological Comparison Based Method to Detect Wormhole Attacks in MANET”, IEEE, 2010.

Z. Tun and A. H. Maw, "Wormhole attack detection in wireless sensor networks," in Proceedings of World Academy of Science, Engineering and Technology, vol. 36, 2008.

F. Nait-Abdesselam, "Detecting and avoiding wormhole attacks in wireless ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 127-133, Apr. 2008.

C.E. Perkins, and E.M. Royer, Ad-hoc On-demand Distance Vector Routing, in: Proceedings of the 2th IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp.90-100.

Abderrahmane Baadache and Ali Belmehdi “Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks”, Elsevier Journal of Network and Computer Applications 35 (2012) 1130–1139. Availavle at SciVerse ScienceDirect.

V. Karpijoki, Security in ad hoc networks. in: Proceedings of the Helsinki University of Technology, Seminars on Network Security ,2000.

J. Lundberg, Routing security in ad hoc networks, in: Proceedings of the Helsinki University of Technology, http://citeseer.nj.nec.com/400961.html.

Jung-Shian Li and Cheng-Ta Lee “Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks”, Elsevier Computer Communications 29 (2006) 1121–1132. Available at science direct.

P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.

Alokparna Bandyopadhyay1, Satyanarayana Vuppala, Prasenjit Choudhury, “A Simulation Analysis of Flooding Attack in MANET using NS-3”, 978-1-4577-0787-2/11/$26.00 ©2011 IEEE

A.Vani, D.Sreenivasa Rao, “Providing of Secure Routing against Attacks in MANETs”,International Journal of Computer Applications (0975 – 8887) Volume 24– No.8, June 2011

Raja Karpaga Brinda .R, Chandrasekar.P , “ Detection and Removal of Co-Operative Black HoleBlack Hole Attack in Manet”, International Journal of Computer Applications (0975 – 8887) Volume 43– No.11, April 2012

Madhusudhananagakumar KS , G. Aghila, “A Survey on Black Hole Attacks on AODV Protocol in MANET” , International Journal of Computer Applications (0975 – 8887) Volume 34– No.7, November 2011

Vishnu K, and Amos J .Paul,” Detection & Removal of cooperative Black/Gray hole attack in Mobile ADHOC Networks.” International Journal of Computer Applications 2010, Volume 1-No.22, pp.38-42.

Onkar V.Chandure, V.T.Gaikwad, “ Detection & Prevention of Gray Hole Attack in Mobile Ad-Hoc Network using AODV Routing Protocol”, International Journal of Computer Applications (0975 – 8887) Volume 41– No.5, March 2012

Mahendra Kumar, Ajay Bhushan, Amit Kumar,” International Journal of Advanced Research in Computer Science and Software Engineering”, Volume 2, Issue 4, April 2012

Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning system against black hole attack in AODV based Manet”, International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp: 54-59, 2009

C. Adjih, T. Clausen, A. Laouiti, P. M ¨uhlethaler, and D. Raffo,“Securing the OLSR routing protocol with or without compromised nodes in the network,” HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, February 2005.

D. Raffo, C. Adjih, T. Clausen, and P. M ¨uhlethaler, “An advanced signature system for OLSR,” in SASN ’04: Proceedings of the 2nd ACM Workshop on security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 10–16.

S. Kannan, T. Kalaikumaran, S. Karthik and V.P. Arunachalam,“A Review on Attack Prevention Methods in MANET” Journal of Modern Mathematics and Statistics Year: 2011 | Volume: 5 | Issue: 1 | Page No.: 37-42

Bo-Cang Peng and Chiu-Kuo Liang”Prevention techniques for flooding attack in Ad Hoc Networks”

Harsh Pratap Singh, Sanjeev Sharma “Guard against cooperative black hole attack in Mobile Ad-Hoc Network” Harsh Pratap Singh et al. / International Journal of Engineering Science and Technology (IJEST)

Lalit Himral, Vishal Vig & Nagesh Chand, ”Preventing AODV Routing Protocol from Black Hole Attack” Lalit Himral et al. / International Journal of Engineering Science and Technology (IJEST)

Rajib Das,Dr. Bipul Syam Purkayastha, Dr. Prodipto Das “Security Measures for Black Hole Attack in MANET: An Approach “Rajib Das et al. / International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4 Apr 2011.

Fan-Hsun Tseng, Li-Der Chou1 and Han-Chieh Chao,“A survey of black hole attacks in wireless mobile ad hoc networks “Tseng et al. Human-centric Computing and Information Sciences 2011, 1:4

Tamilselvan L, Sankaranarayanan V, “Prevention of Blackhole Attack in MANET”. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.

Greece, June 2006.B. Sun; Y. Guan; J. Chen; U.W. Pooch, “Detecting Black-hole Attack in Mobile Ad Hoc Networks” 5th European Personal Mobile Communications Conference, 2003, 490-495.

A. Patcha; A. Mishra; “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks” Radio and Wireless Conference, 2003, 75-78.

X.P. Gao; W. Chen; A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[C]; IFIP International Conference on Network and Parallel Computing Workshops, 2007, 209-214.

D.M. Shila; T. Anjali; Defending selective forwarding attacks in WMNs, IEEE International Conference on Electro/Information Technology, 2008, 96-101.

D.S.J.D. Couto; D. Aguayo; J. Bicket; R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless routing,” in ACM Mobicom, 2003.

Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning system against black hole attack in AODV based Manet”, International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp: 54-59, 2009

Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”

Mohammad Al-Shurman and Seong-Moo Yoon and Seungjin Park, “Black Hole Attack in Mobile Ad Hoc Networks”

Chang Wu Yu, Tung-Kuang, Wu, Rei Heng, Cheng, and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, PAKDD 2007 Workshops, pp. 538–549, 2007

Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, Issue 3, pp: 338–346, 2007

Hongmei Deng, Wei Li, and Dharma P.Agrawal,“Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magzine, vol. 40, Issue: 10, 2002

Hesiri Weerasinghe, “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Proceedings of the Future Generation Communication and Networking, vol. 02, pp: 362-367, 2007

Yogesh Sharma and Sunil Kumar “Effect of Power Avaricious Attack on MANET Routing Protocols”, IEEE, 2011.

H. Li and M. Singhal. A secure routing protocol for wireless adhoc networks. In HICSS’06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences. Pages 1-10, 2006.

Hongmei Deng, Wei. Li and Dharma P. Aggarwal. Routing Security in Wireless Adhoc Networks. In IEEE communication magazine, Pages 70-75, October-2002.

K. Paul and D. Westhoff. Context aware detection of selfish nodes in DSR based adhoc networks. In IEEE GLOBECOM 2002, Taipei, Taiwan, pages 178-182, November 2002.

P. Papadimitratos and Z.J. Haas. Securing routing for mobile adhoc networks. In Proceedings of SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.

Abderrahmane Baadache and, Ali Belmehdi “Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks”, Elsevier, Journal of Network and Computer Applications 35 (2012) 1130–113.

Buchmann J, Dahmen E, Schneider M. Merkle tree traversal revisited. In: Proceedings of the 2nd international workshop on post-quantum cryptography (PQCrypto’08); 2008. p. 63–78.

Sharma S, Gupta R. Simulation study of blackhole attack in the mobile ad hoc networks. Journal of Engineering Science and Technology 2009;4(2):243–50.

Marti S, Giuli TJ, Kevin L, Mary B. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom’00); 2000. p. 255–65.

Kargl F, Klenk A, Schlott S, Weber M. Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of the 1st European on security in ad-hoc and sensor networks (ESAS’04); 2004. p. 152–65.

Buttya´ n L, Hubaux JP. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications (MONET) 2003;8(5):579–92.

Jian Wang, Yanheng Liu and Yu Jiao “Building a trusted route in a mobile ad hoc network considering communication reliability and path length”, Elsevier, Journal of Network and Computer Applications 34 (2011) 1138–1149.

Ramana KS, Chari AA and Kasiviswanth N “Trust based security routing in mobile adhoc networks”, International Journal on Computer Science and Engineering 2010; 2(2):259–63.

Luo J, Ni X, Yong J “A trust degree based access control in grid environments”, Information Science 2009; 179(15):2618–28.

Azzedin F, Maheswaran M. “Evolving and managing trust in grid computing systems”, In: Proceedings of IEEE Canadian conference on electrical and computer engineering (CCECE’02); May 2002. pp. 1424–9.

Yau P, Mitchell CJ “Reputation methods for routing security for mobile ad hoc networks”, In: Proceedings of joint IST workshop on mobile future and symposium on trends in communications SympoTIC ’03. IEEE Press; 2003. p. 130–7.

K. Komathy and P. Narayanasamy “Trust-based evolutionary game model assisting AODV routing against selfishness”, Elsevier, journal of Network and Computer applications, 2008.

Buttyan, L., & Hubaux, J. P. “Security and cooperation in wireless networks”, Cambridge University Press, 2008.

Hung-Min Sun , Chiung-Hsun Chen and Yu-Fang Ku “A novel acknowledgment-based approach against collude attacks in MANET”, Elsevier, Expert Systems with Applications 39 (2012) 7968–7975, 2012.

NS-3 simulator, http://nsnam.org/

Lien-Wen Wu and Rui-Feng Yu “A Threshold-Based Method for Selfish Nodes Detection in MANET”, IEEE, 2010.

S. Yokoyama, Y. Nakane, O. Takahashi, and E.Miyamoto, “Evaluation of the Impact of Selfish Nodesin Ad Hoc Networks and Detection and CountermeasureMethods,” Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006).

Wenjia Li, Anupam Joshi and Tim Finin “SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks”, IEEE, Military Communications Conference, 2011 - Milcom 2011.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.