scispace - formally typeset
Proceedings ArticleDOI

Preventing packet dropping attack on AODV based routing in mobile ad-hoc MANET

Neema Soliyal, +1 more
- pp 1371-1375
Reads0
Chats0
TLDR
This paper analysed nature of packet dropping and bandwidth attack based on AODV routing protocol on MANET, and proposed node bypassing technique to detect such kind of attacks.
Abstract
Mobile adhoc network is a wireless network. Which forwards the information in forms of packets either data packet or control packet from source to destination. It is a collection of mobile devices that can move from one direction to other that is the reason the topology is not fixed, and does not required any prefix infrastructure for configuring MANET. All devices under network can communicate with each other within a range. Packet dropping and bandwidth attacks are one of major concern on mobile adhoc network. If enough security measures are not their then the attacker nodes significantly degrades the performance of the network. This paper analysed nature of packet dropping and bandwidth attack based on AODV routing protocol on MANET, and proposed node bypassing technique to detect such kind of attacks.

read more

Citations
More filters
Proceedings ArticleDOI

A Survey on Security in VANETs

TL;DR: A comprehensive survey on various attacks and the proposed solutions by the various researchers and also analysis and comparison of results for the simulated proposed solutions are presented.
Journal ArticleDOI

Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol

TL;DR: The improved failure aware third party Auditor (IFTPA) based homomorphism linear authenticator (HLA) mechanism (IFHM) is proposed with the secured ad hoc on demand distance vector (SAODV) for trustworthiness verification of packet loss information and malicious node detection by dropping identifying of routing and data packet.

Efficiency and Accuracy Enhancement of Intrusion Detection System Using Feature Selection and Cross-layer Mechanism

TL;DR: A novel cross-layer design for malicious packet loss detection in MANET is proposed using features from physical layer, network layer and MAC layer to make a better detection decision and a packet loss free routing algorithm is presented accordingly.
Proceedings ArticleDOI

Mitigation and performance evaluation Mechanism for Selfish Node Attack in MANETs

TL;DR: This proposed work explains the mitigation method by using node isolation method so that once the malicious node is detected, it will be moved out from the cluster and hence the packet drop in the network due to Selfish Node attack can be reduced.
Journal ArticleDOI

Exposure and Mitigation of the Gray Hole Attack from AODV in Mobile Ad hoc Network: An Approach

TL;DR: This paper proposes an probabilistic approach with IDS (Intrusion Detection System) which detect and mitigate the gray hole attack effectively and comparative analysis is perform among the performance metrics such as Throughput, Packet Delivery Ratio and Routing load etc.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Performance comparison of two on-demand routing protocols for ad hoc networks

TL;DR: It is demonstrated that even though DSR and AODV share a similar on-demand behavior the differences in the protocol mechanics can lead to significant performance differentials.
Journal ArticleDOI

Performance comparison of two on-demand routing protocols for ad hoc networks

TL;DR: It is demonstrated that even though DSR and AODV share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials.
Proceedings ArticleDOI

Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks

TL;DR: The main feature of the proposed system is its ability to discover malicious nodes which can partition the network by falsely reporting other nodes as misbehaving and then proceeds to protect the network.
Related Papers (5)