Skip to main content

Remapping Attack Detection and Prevention for Reliable Data Service in MANET

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Advancement on Computer and Communication

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 34))

Abstract

Mobile ad hoc Network is a promising technology in recent years. The number of nodes are forming dynamic link in between sender and receiver. The Mobile ad hoc Network (MANET) are operating in absence of centralized administration and because of that attackers are simply changed or acting malicious activities in network. One in all the most important challenge in wireless mobile ad hoc sensor networks nowadays is protection. In this title we tend to plan a completely unique security scheme for Remapping Attack. This type of attacks is amendment the priority of communication and acting misbehavior through flooding of huge quantity of reserve packets in communication network. The attacker node is provides the primary priority itself for information sending and remainder of the nodes priority is come back when attacker. The proposed results of assaulter malicious activities are consumed link bandwidth and additionally actual data delivery in network is affected. The aim of this research is to measure the malicious performance of Remapping attack in MANET and identifies the node/s that are affected the routing performance. The proposed security theme are check the priority order of each sender node in network that require to communicate and solely the offender is one altogether the node that flooded the reserve packets in network and in addition the assaulter node is not the sender or receiver. The proposed security scheme against remapping are block the activity of offender. The performance of network is measured on the basis of performance metrics like as network throughput, PDF and routing overhead, attacker node identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Konorski, J., Szott, S.: Discouraging traffic remapping attacks in local ad hoc networks. IEEE Trans. Wirel. Commun. 13(7), 3752–3767 (2014)

    Article  Google Scholar 

  2. Chlamtac, I., Conti, M., Liu, J.J.-N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)

    Article  Google Scholar 

  3. Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31. ACM, 2016

    Google Scholar 

  4. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks, Wirel./Mob. Netw. Secur. 103–135 (2006)

    Google Scholar 

  5. Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different types of attacks on integrated MANET-internet communication. Int. J. Comput. Sci. Secur. (IJCSS) 4(3), 265–274 (2010)

    Google Scholar 

  6. Manikandan, K.P., Satyaprasad, R., Rajasekhararao, K.: A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks. Int. J. Adv. Comput. Sci. Appl. 2(3), 7–12 (2011)

    Google Scholar 

  7. Saha, H.N., Bhattacharyya, D., Pk, Banerjee: Study of different attacks in MANET with its detection & mitigation schemes. Int. J. Adv. Eng. Technol. IJAET 3(1), 383–388 (2012)

    Google Scholar 

  8. Jain, S.: Security threats in MANETS: a review. Int. J. Inf. Theor. (IJIT) 3(2) (2014)

    Google Scholar 

  9. Tayal, S., Gupta, V.: A survey of attacks on MANET routing protocols. Int. J. Innov. Res. Sci. Eng. Technol. 2(6), 2280–2285 (2013)

    Google Scholar 

  10. Sulthana, S.R., Reddy, D.S.C., Manohar, T.B.: An efficient mechanism of handling MANET routing attacks using risk aware mitigation with distributed node control. Int. J. Mod. Eng. Res. (IJMER) 3(5), 2996–3004 (2013)

    Google Scholar 

  11. Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Netw. 55, 3441–3457 (2011)

    Article  Google Scholar 

  12. Gagandeep, A., Kumar, P.: Analysis of different security attacks in MANETs on protocol stack a-review. Int. J. Eng. Adv. Technol. (IJEAT) 1(5) (2012). ISSN: 2249-8958

    Google Scholar 

  13. Narang, E.K.: A study of different attacks in MANET and discussion about solutions of black hole attack on AODY protocol. Int. J. Adv. Res. Comput. Eng. Technol. 2(4), 1601–1606 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aradhana Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saxena, A., Khule, M. (2018). Remapping Attack Detection and Prevention for Reliable Data Service in MANET. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8198-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8197-2

  • Online ISBN: 978-981-10-8198-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics