Professional Documents
Culture Documents
ABSTRACT
Mobile Ad hoc Network (MANET) is used most
commonly all around the world, because it has the
ability to communicate with each other without any
fixed network. A proper security solution is needed for
networks to protect both route and data packet delivery
operations in the network layer. Security is an essential
requirement in MANET. The malicious node in the
network act as a normal node, so there is a need of
security solution to prevent from various attacks. In this
paper, we have reviewed about byzantine malicious
attacks and basically on wormhole attack in MANET.
Keywords MANET, Malicious Nodes, Security,
Wormhole
1. INTRODUCTION
A Mobile Ad-Hoc Network (MANET) is a collection of
wireless mobile nodes can form without using any
centralized access point, infrastructure, or centralized
administration. Wireless ad hoc or on-the-fly networks
are characterized by the lack of infrastructure. Nodes in a
mobile ad-hoc network are free to move and organize
themselves in an arbitrary fashion. Security is major and
important issue in MANET.
There are various threats to MANET. One of them is
wormhole attack about which we have focused in this
paper. Wormhole attack is a serious threat as malicious
nodes can use it for Denial of Service attack by dropping
some data or control packets. It is more powerful as
launched by more than one attacker.
The rest of the paper is organized as follows: section II
and III describes security goals and attacks respectively.
In the section IV, we have described wormhole attack.
confidentiality,
repudiation.
authentication,
integrity
and
non-
2.1 Availability
Availability implies that the requested services (e.g.
bandwidth and connectivity) are available in a timely
manner even though there is a potential problem in the
system. Availability of a network can be tempered for
example by dropping off packets and by resource
depletion attacks.
2.2 Confidentiality
Confidentiality ensures that classified information in the
network is never disclosed to unauthorized entities.
Confidentiality can be achieved by using different
encryption techniques so that only the legitimate
communicating nodes can analyze and understand the
transmission. The content disclosure attack and location
disclosure attack reveals the contents of the message
being transmitted and physical information about a
particular node respectively.
2.3 Authenticity
Authenticity is a network service to determine a users
identity. Without authentication, an attacker can
impersonate any node, and in this way, one by one node,
it can gain control over the entire network.
2.4 Integrity
Integrity guarantees that information passed on between
nodes has not been tempered in the transmission. Data
can be altered both intentionally and accidentally (for
example through hardware glitches, or in case of ad hoc
wireless connections through interference).
2.5 Non Repudiation
Non-repudiation ensures that the information originator
cannot deny having sent the information. This service is
useful for detection and isolation of compromised nodes
in the network. Many authentication and secure routing
algorithms implemented in ad hoc networks rely on
trust-based concepts. The fact that a message can be
www.ijsret.org
211
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 2, May 2014
3.
5. RELATED WORK
Author in paper [1] proposes, all the results show that
malicious nodes give a bad impact on the performance of
AODV on some parameters as packet delivery ratio,
throughput, end to end delay ratio, data packet sent /
receive and control packets drop. In future an effort will
be used to detect and deactivate the working of
malicious node from the AODV.
The study of wormhole attack launched in AODV
routing protocol in MANET [2] is conducted and the
simulation study depicts the performance degradation in
terms of parameters like network throughput, average
end to end delay, packet delivery ratio, drop rate.
According to [3], a security mechanism is proposed to
defend against a cooperative gray hole attack on well
known AODV routing protocol in MANETs. The
proposed mechanism consists of four modules as:
Neighborhood Data Collection, Local Anomaly
www.ijsret.org
212
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 2, May 2014
6.
ACKNOWLEDGEMENT
I am deeply thankful to my supervisor Prof. Arun Kumar
and my all friends whose help, stimulating suggestions
and encouragement helped me in all the time for my
review.
REFERENCES
[1] Vijay Kumar, Rakesh Sharma, Ashwani Kush,
Effect of Malicious Nodes on AODV in Mobile Ad
Hoc Networks, International Journal of Computer
Science and Management Research,Vol.1 issue 3
ISSN 2278-733X, October 2012.
[2] Vandana C.P, Dr. A. Francis Saviour Devaraj,
Evaluation of Impact of Wormhole Attack on
AODV, Int. J. Advanced Networking and
Applications, Vol. issue. Pp. 2013.
[3] Jaydip Sen, M. Girish Chandra, Harihara S.G.,
Harish Reddy and P. Balamuralidhar, A Mechanism
for Detection of Gray Hole Attack in Mobile Ad Hoc
Networks, Proceedings of 6th IEEE Conference on
Global Information Infrastructure Synposium (GIIS),
December 2007.
[4] G.S. Mamatha and Dr. S. C. Sharma, A New
Secured Approach for MANETs against Network
Layer Attacks, First IEEE International Conference
on Integrated Intelligent Computing, 2010.
[5] K. Lakshmi, S. Manju Priya, A. Jeevarathinam, K.
Rama and K. Thilangam, Modified AODV Protocol
against Black Hole Attacks in MANET,
International
Journal
of
Engineering
and
Technology, Vol. 2, 2010.
[6] Po-Chun TSOU, Jian-Ming CHANG, Yi-Hsuan
LIN, Han-Chieh CHAO and Jiann-Liang CHEN,
Developing a BDSR Scheme to Avoid Black Hole
Attack Based on Proactive and Reactive
Architecture in MANETs, ICACT, Feb. 2011.
[7] Rajib Das, Dr. Bipul Syam Purkayastha and Dr.
Prodipto Das, Security Measures for Black Hole
Attack in MANET: An Approach, International
Journal of Engineering Science and Technology,
Vol. 3, No. 4, pp- 2832-2838, ISSN: 0975-5462,
April 2011.
[8] Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao
and Jiann-Liang Chen, CBDS: A Cooperative Bait
Detection Scheme to Prevent Malicious Node for
MANET Based on Hybrid Defense Architecture,
IEEE, 2011.
[9] Mohammad S. Obaidat, Issac Wougang, Sanjay
Kumar Dhurandher and Vincent Koo,Preventing
Packet Dropping and Message Tampering Attacks
www.ijsret.org
213
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 2, May 2014
www.ijsret.org
214