Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography

Full Text (PDF, 285KB), PP.37-43

Views: 0 Downloads: 0

Author(s)

Nitin Khanna 1,*

1. College of Engineering and Management, Kapurthala, Punjab, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.04.05

Received: 13 Sep. 2015 / Revised: 28 Nov. 2015 / Accepted: 6 Jan. 2016 / Published: 8 Apr. 2016

Index Terms

AODV (Ad-hoc On-demand Distance Vector) Routing Protocol, Trueness Level, Security, Cryptography, Blackhole Attack, Grayhole Attack

Abstract

MANET is a decentralized network that has no infrastructure and nodes can communicate with each other by multi-hoping the messages. Due to this nature of MANET, it is prone to many security attacks in which packet drop attacks are very common. Various packet drop attacks like Blackhole attacks, Grayhole attack, Co-operative Blackhole attack, etc are the attacks that become a bottleneck in efficient routing and security in MANET. Various mechanisms are devised in past but none of them prove to be effective against all types of packet drop attacks. In this paper, a mechanism is formulated that enhances the AODV routing protocol with Trueness Level and Cryptography for effectively counter all types of packet drop attacks by mitigating them through avoidance and elimination of source of attack after detection. This mechanism is powered by efficient use of Cryptography in its natural form. This work is compared with published work Extended Data Routing Information mechanism against various parameters like Packet Delivery Ratio, Normalized Control Load, Accuracy and Reliability in the same environment and parameters in MATLAB 2013a.

Cite This Paper

Nitin Khanna, "Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.4, pp.37-43, 2016. DOI:10.5815/ijcnis.2016.04.05

Reference

[1]Punya Peethambaran and Dr. Jayasudha J. S., “SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES”, International Journal of Network Security & Its Applications, Vol.6, No. 3, May 2014.
[2]Gaurav, Naresh Sharma Himanshu Tyagi, “An Approach: False Node Detection Algorithm in Cluster Based MANET”, International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4, No. 2, February 2014.
[3]K. Sahadevaiah, Prasad Reddy P.V.G.D., “Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks”, MacroThink Institute, Vol. 3, No. 4, 2011.
[4]Enrique Hernández-Orallo, Manuel D. Serrat, Olmos Juan-Carlos, Cano Carlos, T Calafate, Pietro Manzoni, “A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs”, Springer , August 2013.
[5]Tushar Sharma, Mayank Tiwari, Prateek kumar Sharma, Manish Swaroop, Pankaj Sharma, “An Improved Watchdog Intrusion Detection Systems In Manet”, International Journal of Engineering Research & Technology, Vol. 2, No. 3, March 2013.
[6]Vrutik Shah, Nilesh Modi “An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks”, International Journal of Computer Applications, Vol. 69, No.7, May 2013.
[7]D.Anitha, Dr.M.Punithavalli “A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS”, IJCSMC, Vol. 2, No. 3, pp. 112 – 119, March 2013.
[8]Carlos de Morais cordeiro and Dharma P. Aggarwal, “Mobile Ad-hoc Networking”, 2004.
[9]Andreas Tonnesen “Mobile Ad-hoc Networks”, 2004.
[10]Charles E Perkins Elizabeth M Royer “Ad hoc On Demand Distance Vector Routing”, 1999.
[11]Rashid Hafeez Khokhar Md Asri Ngadi Satria Mandala “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, 2008.
[12]Behrouz A Forouzan “Data Communications and Networking 4th Edition”, Tata McGraw Hill Companies, 2004.
[13]Serrat-Olmos, M.D. Hernandez-Orallo, E. ; Cano, J., Calafate, C.T., Manzoni, P., “Accurate detection of black holes in MANETs using collaborative bayesian watchdogs”, Wireless Days(WD), IEEE Conference, pp. 1-6, Nov. 2012.
[14]R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM 21 vol. 2, pp. 120–126, 2013.
[15]Nitin Khanna, Parminder Singh, “Mitigating Blackhole and Security attacks in MANET using Enhanced W-AODV with Trueness Level and Cryptography”, IJRECE, vol. 3, no. 2, pp. 146-151, 2015.
[16]Lein Harn Miao Fuyou, “Multilevel threshold secret sharing based on the Chinese Remainder Theorem”, Information Processing Letters 114, ELSEVIER, pp. 504–509, 2014.
[17]Tarun Varshney, Tushar Sharmaa, Pankaj Sharma (2014), “Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network”, IEEE International Conference on Communication Systems and Network Technologies, pp. 217-221, June, 2014.
[18]Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, Arjun Agrawal,”Detection and Removal of Co-operative Blackhole and Grayhole attacks in MANET”, International Conference on System Engineering and Technology, Bandung, Indonesia, September, 2012.