Advertisement

A Proposal for Packet Drop Attacks in MANETS

  • Mahesh Swarna
  • Syed Umar
  • E. Suresh Babu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 372)

Abstract

The packet drop attack is more familiar to protection risks in MANETS. These attackers implement loop-hole which bring with envious characteristics because the path finding procedure which is vital and unavoidable. Researchers and investigators have performed distinct recognition methods recommend various types of recognition schemes. AODV protocol which correctly appropriate redirecting method for the MANETS and it is more susceptible to dark gap strike by the envious nodes. A harmful node that wrongly delivers the RREP (route reply) that it has a newest path with lowest hop count to location and then it falls all the getting packets. In this paper we present four types of different protocols for detecting black whole attacks and discuss state of the art routing methods. We also perform different properties in collaborative packet drop attacks and analyze categories of propose protocols with specified features stored in wireless ad hoc networks. We analyze comparison of proposed protocol with existing protocols and their methods with respect to time and other features in wireless ad hoc networks.

Keywords

Packet Drop System Topology Resource Node RREQ Message RREP Packet 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    P.-C. Tsou, J.-M. Chang, Y.-H. Lin, H.-C. Chao, J.-L. Chen, Developing a BDSRScheme to avoid packet drop attack based on proactive and reactive architecture in MANETs, in Paper Presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Feb 2011, pp. 13–16Google Scholar
  2. 2.
    E. Çayırcı, C. Rong, Security in Wireless Ad Hoc and Sensor Networks, 1st edn. (Wiley, New York, 2009), p. 10Google Scholar
  3. 3.
    S. Ci et al., Self-regulating network utilization in mobile ad-hoc wireless networks. IEEE Trans. Vehic. Tech. 55(4), 1302–1310 (2006)CrossRefGoogle Scholar
  4. 4.
    M.-Y. Su, Prevention of selective packet drop attacks on mobile ad hoc network through intrusion detection systems. Comput. Commun. 21–26 (2010)Google Scholar
  5. 5.
    H. Khattak, Nizamuddin, F. Khurshid, N. Amin, Preventing Black and Gray Hole Attacks in AODV Using Optimal Path Routing and Hash. 978-1-4673-5200-0/13/$31.00 ©2013 IEEEGoogle Scholar
  6. 6.
    Z. Ahmad, J. Ad Manan, K. AbdJalil, Performance evaluation on modified AODV protocols, in IEEE Asia-Pacific Conference on Applied Electromagnetics, 11–13 Dec 2012Google Scholar
  7. 7.
    K. Osathanunkul, N. Zhang, A Countermeasure to Packet Drop Attacks in Mobile Ad Hoc Networks. 978-1-4244-9573-3/11/$26.00 ©2011 IEEEGoogle Scholar
  8. 8.
    N. Arora, N.C. Barwar, Performance analysis of DSDV, AODV and ZRP under packet drop attack. Int. J. Eng. Res. Technol. (IJERT), 3(04), (2014)Google Scholar
  9. 9.
    A. Mukija, Reactive routing protocols for mobile ad hoc network, in IEEE Network Magazine, Special Issue on Networking Security, vol. 14 (2001)Google Scholar
  10. 10.
    K. Netmesiter, Routing protocols in mobile ad hoc networks: challenges and solutions, in IEEE Wireless Communications Magazine, Sponsored by IEEE Communications Society, Vol. 11 (February 2010)Google Scholar
  11. 11.
    R.H. Jhaveri, S.J. Patel, DoS attacks in mobile ad-hoc networks: a survey. Second Int. Conf. Adv. Comput. Commun. Technol. 2(2), 535–540 (2012)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.C.S.E DepartmentK L UniversityGunturIndia
  2. 2.Department of C.S.EK L UniversityGunturIndia

Personalised recommendations