Abstract
Mobile ad hoc Network is a promising technology in recent years. The number of nodes are forming dynamic link in between sender and receiver. The Mobile ad hoc Network (MANET) are operating in absence of centralized administration and because of that attackers are simply changed or acting malicious activities in network. One in all the most important challenge in wireless mobile ad hoc sensor networks nowadays is protection. In this title we tend to plan a completely unique security scheme for Remapping Attack. This type of attacks is amendment the priority of communication and acting misbehavior through flooding of huge quantity of reserve packets in communication network. The attacker node is provides the primary priority itself for information sending and remainder of the nodes priority is come back when attacker. The proposed results of assaulter malicious activities are consumed link bandwidth and additionally actual data delivery in network is affected. The aim of this research is to measure the malicious performance of Remapping attack in MANET and identifies the node/s that are affected the routing performance. The proposed security theme are check the priority order of each sender node in network that require to communicate and solely the offender is one altogether the node that flooded the reserve packets in network and in addition the assaulter node is not the sender or receiver. The proposed security scheme against remapping are block the activity of offender. The performance of network is measured on the basis of performance metrics like as network throughput, PDF and routing overhead, attacker node identification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Konorski, J., Szott, S.: Discouraging traffic remapping attacks in local ad hoc networks. IEEE Trans. Wirel. Commun. 13(7), 3752–3767 (2014)
Chlamtac, I., Conti, M., Liu, J.J.-N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)
Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31. ACM, 2016
Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks, Wirel./Mob. Netw. Secur. 103–135 (2006)
Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different types of attacks on integrated MANET-internet communication. Int. J. Comput. Sci. Secur. (IJCSS) 4(3), 265–274 (2010)
Manikandan, K.P., Satyaprasad, R., Rajasekhararao, K.: A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks. Int. J. Adv. Comput. Sci. Appl. 2(3), 7–12 (2011)
Saha, H.N., Bhattacharyya, D., Pk, Banerjee: Study of different attacks in MANET with its detection & mitigation schemes. Int. J. Adv. Eng. Technol. IJAET 3(1), 383–388 (2012)
Jain, S.: Security threats in MANETS: a review. Int. J. Inf. Theor. (IJIT) 3(2) (2014)
Tayal, S., Gupta, V.: A survey of attacks on MANET routing protocols. Int. J. Innov. Res. Sci. Eng. Technol. 2(6), 2280–2285 (2013)
Sulthana, S.R., Reddy, D.S.C., Manohar, T.B.: An efficient mechanism of handling MANET routing attacks using risk aware mitigation with distributed node control. Int. J. Mod. Eng. Res. (IJMER) 3(5), 2996–3004 (2013)
Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Netw. 55, 3441–3457 (2011)
Gagandeep, A., Kumar, P.: Analysis of different security attacks in MANETs on protocol stack a-review. Int. J. Eng. Adv. Technol. (IJEAT) 1(5) (2012). ISSN: 2249-8958
Narang, E.K.: A study of different attacks in MANET and discussion about solutions of black hole attack on AODY protocol. Int. J. Adv. Res. Comput. Eng. Technol. 2(4), 1601–1606 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saxena, A., Khule, M. (2018). Remapping Attack Detection and Prevention for Reliable Data Service in MANET. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds) Proceedings of International Conference on Recent Advancement on Computer and Communication . Lecture Notes in Networks and Systems, vol 34. Springer, Singapore. https://doi.org/10.1007/978-981-10-8198-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-8198-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8197-2
Online ISBN: 978-981-10-8198-9
eBook Packages: EngineeringEngineering (R0)