Loading...
International Journal of Advanced Computing and Communication Systems

Security Based Protocol Design in Mobile ADHOC Networks Using Cooperative Bait Detection Approach

Sindhu K and Dhanalakshmi S, Department of Computer Science and Engineering, SNS College of Technology,Coimbatore, Tamilnadu, India .

International Journal of Advanced Computing and Communication Systems

Received On :

Revised On :

Accepted On :

Published On :

Volume 05, Issue 01

Page No : 029-032

Abstract

In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching gray hole or collaborative black hole attacks is a challenge. This paper attempts toresolve this issue by designing a dynamic source routing(DSR)-based routing mechanism, which is referred to asthe cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactivedefense architectures. Our CBDS method implements areverse tracing technique to help in achieving the statedgoal. Simulation results are provided, showing that inthe presence of malicious-node attacks, the CBDSoutperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen asbenchmarks) in terms of packet delivery ratio androuting overhead (chosen as performance metrics).

Keywords

MANET,CBDS,BFTR.

Cite this Article

Sindhu K and Dhanalakshmi S, “Security Based Protocol Design in Mobile ADHOC Networks Using Cooperative Bait Detection Approach, ”International Journal of Advanced Computing and Communication Systems, pp. 001-008,March 2018.

Copyright

© 2018 Sindhu K and Dhanalakshmi S. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Download