Defense against Collaborative attacks in MANET

1532 Words4 Pages

I. INTRODUCTION In recent years, Mobile ad hoc network is used due to increasing number of mobile devices such as mobile phones, laptops, PDA etc., An ad hoc network consists of infrastructure based ad hoc network that depends on pre-constructed infrastructure made of fixed nodes and infrastructure less ad hoc network that does not depend on pre-existing infrastructure and it is dynamically cooperate with set of independent nodes. A Mobile ad hoc network is self-organized network without infrastructure connected by wireless links. Due to de-centralized infrastructure, a node can act both as router and host. The nodes can directly communicate each other within their transmission range otherwise the multi-hop network is needed. The mobile ad hoc network is widely used in day-to-day life such as military operations where an infrastructure is unknown to the soldiers. Web services like e-mail can be used for file transfer and it also used in multimedia applications. It is also used in disaster recovery such as earthquake, tsunamis etc. In MANET, the nodes are free to move, it will change its connection to other devices frequently. An important issue in MANET is routing between two nodes, due to the changing topology of the network. The routing protocol should be secure to protocol to protect against network attacks such as Black hole attack, worm hole attack, Dos attack, grey hole attack. Mostly AODV, DSR, DSDV are prone to the attacks. Research work concentrates in the field of routing and security. MANET has attacks in all the layers. In the physical layer jamming, intercept and eavesdrop attacks may occur. In the data link layer, traffic analysis, monitoring, disruption may occur. In the network layer, wormhole, black hole, byzantin... ... middle of paper ... ...e Selection Algorithm (HNSA) detectors to observe the deviations from the normal or expected behavior of the nodes. The main components of this scheme are anomaly detection engine that capture the data and compares with the users profile stored in the database and another is report database that the normal profiles and behavior are stored. BAIDS is implemented as an extension technique over DSR, AODV and DSDV. A risk aware response mechanism [20] is used for mitigating the routing attacks in MANET. The extended Dempster-Shafer theory evidence model of notion with importance factors and dempster rule of combination is non-associative and weighted is used to combine the multiple data from the observational node. An adaptive decision making considers both attacks and countermeasures. The response mechanism has local routing table recovery and global routing recovery.

More about Defense against Collaborative attacks in MANET

Open Document