A STUDY ON PACKET DROPPING ATTACK DETECTION METHODS IN MANETS

Authors

  • Reni K Cherian Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India Author
  • Roshan Thomas Jacob Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India. Author

Keywords:

AODV, Black Hole Attack, DSR, Gray Hole Attack, Mobile Ad Hoc Networks, Packet Dropping Attack

Abstract

For the past few years, mobile ad hoc networks (MANETs) have been so common in the areas of mobile communication. Due to wide usage of MANETs over different areas, MANETs are vulnerable to many attacks. One common type of attack that is the packet dropping attack such as the black hole and gray hole attacks which can eventually led to the denial of service attacks (DoS). The reason behind the attack is that the network routing protocols are designed in a way that the protocol assumes there are no intruders or malicious nodes are present in the network. Ad hoc on-demand distance vector (AODV) protocol and dynamic source routing (DSR) protocol are some of the main protocols that are currently used in MANETs. There is a great challenge in detecting these packet dropping attacks in a network. In this paper, I present a study on the packet dropping attack detection methods on the MANET routing protocols.

References

IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF website www.ietf.org/dyn/wg/charter/manet-charter.html

Dr. Kadhar Nawaz and Deepa. S, ”A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns”, IJCA Special Issue on Mobile Adhoc Networks MANETs, 2010.

C.E. Perkins and E. Royer, ”Ad hoc on-demand distance vector routing”, In Proc. of IEEE Workshop on Mobile Computing Systems and Applications, Febraury 1999, pp. 90-100.

David B. Johnson, David A. Maltz, and Josh Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc Networking, pp. 139-172, Addison-Wesley, 2001.

Mohammad Taqi Soleimani and Mahboubeh Kahvand, “Defending Packet Dropping Attacks Based on Dynamic Trust Model in Wireless Ad Hoc Networks”, 17th IEEE Mediterranean Electrotechnical Conference, Beirut, Lebanon, April 2014, 13-16.

N. Bhalaji and A. Shanmugam, “Dynamic Trust Based Method to Mitigate Grayhole Attack in Mobile Adhoc Networks”, International Conference on Communication Technology and System Design, 2012, 881 888.

L. Buttyan and J. P. Hubaux, ”Stimulating cooperation in self organizing mobile ad hoc networks”, ACM/Kluwer Mobile Netw. Appl., Vol. 8, No. 5, pp. 579-592, Oct. 2003.

K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks”, in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 2137- 2142.

Tao Shu and Marwan Krunz, “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Network”, IEEE Transactions on Mobile Computing, Vol. 14, April 2015.

Downloads

Published

2016-05-29

How to Cite

Reni K Cherian, & Roshan Thomas Jacob. (2016). A STUDY ON PACKET DROPPING ATTACK DETECTION METHODS IN MANETS. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 4(3), 48-52. http://ijrcait.com/index.php/home/article/view/IJRCAIT_04_03_009