SlideShare uma empresa Scribd logo
1 de 13
DEFENDING AGAINST COLLABORATIVE ATTACKS BY
MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT
DETECTION APPROACH
Presented by
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in
Ph: 9952077540
Abstract
• In mobile ad hoc networks (MANETs), a primary requirement for the establishment of
communication among nodes is that nodes should cooperate with each other. In the presence of
malevolent nodes, this requirement may lead to serious security concerns; for instance, such
nodes may disrupt the routing process.
• In this context, preventing or detecting malicious nodes launching grayhole or collaborative
blackhole attacks is a challenge.
• This project attempts to resolve this issue by designing a dynamic source routing (DSR)-based
routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that
integrates the advantages of both proactive and reactive defense architectures.
• Our CBDS method implements a reverse tracing technique to help in achieving the stated goal.
Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS
outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as
benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance
metrics).
www.iistechnologies.in
Ph: 9952077540
Existing System
• The lack of any infrastructure added with the dynamic topology feature of MANETs make these
networks highly vulnerable to routing attacks such as blackhole and grayhole (known as variants
of blackhole attacks).
• In blackhole attacks, a node transmits a malicious broadcast informing that it has the shortest
path to the destination, with the goal of intercepting messages.
• In this case, a malicious node (so-called blackhole node) can attract all packets by using forged
Route Reply (RREP) packet to falsely claim that “fake” shortest route to the destination and then
discard these packets without forwarding them to the destination.
• In grayhole attacks, the malicious node is not initially recognized as such since it turns malicious
only at a later time, preventing a trust-based security solution from detecting its presence in the
network.
• It then selectively discards/forwards the data packets when packets go through it.
www.iistechnologies.in
Ph: 9952077540
Disadvantages
www.iistechnologies.in
Ph: 9952077540
• Higher energy consumption
• Routing overhead
• Increase time delay
Proposed System
www.iistechnologies.in
Ph: 9952077540
• In this project, proposes a cooperative bait detection scheme (CBDS) is presented that effectively
detects the malicious nodes that attempt to launch grayhole/collaborative blackhole attacks.
• In our scheme, the address of an adjacent node is used as bait destination address to bait
malicious nodes to send a reply RREP message, and malicious nodes are detected using a reverse
tracing technique.
• Any detected malicious node is kept in a blackhole list so that all other nodes that participate to
the routing of the message are alerted to stop communicating with any node in that list.
• Unlike previous works, the merit of CBDS lies in the fact that it integrates the proactive and
reactive defense architectures to achieve the aforementioned goal.
Advantages
• Decrease the energy consumption
• Decrease the time delay
• Increase the throughput
• Reduce the routing overhead
www.iistechnologies.in
Ph: 9952077540
Flow Diagram
www.iistechnologies.in
Ph: 9952077540
Bait Detection
Scheme
Send Bait
location
Send RREQ to one
hop neighbor node
Detect black
hole attacker
Use reverse
tracing
technique
Update neighbor
list
Send Packet through the
best path to Sink
Receive RREP
Conclusion
www.iistechnologies.in
Ph: 9952077540
• In this project, we have proposed a new mechanism (called the CBDS) for detecting malicious
nodes in MANET’s under gray/collaborative blackhole attacks.
• Our simulation results revealed that the CBDS outperforms the DSR, 2ACK, and BFTR schemes,
chosen as benchmark schemes, in terms of routing overhead and packet delivery ratio.
Future Work
www.iistechnologies.in
Ph: 9952077540
• Investigate the feasibility of adjusting our CBDS approach to address other types of collaborative
attacks on MANETs.
• Investigate the integration of the CBDS with other well-known message security schemes in order
to construct a comprehensive secure routing framework to protect MANETs against miscreants.
TOOLS AND SOFTWARE USED
Software
• Network simulator(NS2)
Language
• Object Oriented Tool Command Language(OTCL)
• C++
www.iistechnologies.in
Ph: 9952077540
References
• P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, “CBDS: A cooperative bait detection
scheme to prevent malicious node forMANET based on hybrid defense architecture,” in
Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp.
1–5.
• S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing
Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved
March 18, 2013).[ Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html
• C. Chang, Y.Wang, and H. Chao, “An efficientMesh-based core multicast routing protocol
onMANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229–239, Apr. 2007.
• D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile
Comput., pp. 153–181, 1996.
• I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone
protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp.
2727–2740.
www.iistechnologies.in
Ph: 9952077540
Services Offered
• Coding with Software’s
• Documents
• Video File
• Skype classes(Online Support)
• Team viewer Support(Online Support)
• Future Enhancement
• Paper writing
• Support For Inter-National Conference paper publication.
www.iistechnologies.in
Ph: 9952077540
Contact
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in

Mais conteúdo relacionado

Mais procurados

CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 

Mais procurados (16)

CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
A43030104
A43030104A43030104
A43030104
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 

Destaque

Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta swet4
 
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sitesPrivacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sitesieeepondy
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 

Destaque (9)

Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sitesPrivacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sites
 
Manet
ManetManet
Manet
 
MANET
MANETMANET
MANET
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 

Semelhante a Defending against collaborative attacks by malicious nodes in manets a cooperative bait detection approach

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networkstheijes
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismINFOGAIN PUBLICATION
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIJECEIAES
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 

Semelhante a Defending against collaborative attacks by malicious nodes in manets a cooperative bait detection approach (20)

Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
 
B010110514
B010110514B010110514
B010110514
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networks
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
ant2
ant2ant2
ant2
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 

Mais de IISTech2015

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...IISTech2015
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...IISTech2015
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...IISTech2015
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...IISTech2015
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksIISTech2015
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...IISTech2015
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemIISTech2015
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...IISTech2015
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksIISTech2015
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project TitlesIISTech2015
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerIISTech2015
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterIISTech2015
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...IISTech2015
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...IISTech2015
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...IISTech2015
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...IISTech2015
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing IISTech2015
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless IISTech2015
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...IISTech2015
 
A high step up converter with voltage
A high step up converter with voltageA high step up converter with voltage
A high step up converter with voltageIISTech2015
 

Mais de IISTech2015 (20)

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation system
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controller
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel Converter
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
 
A high step up converter with voltage
A high step up converter with voltageA high step up converter with voltage
A high step up converter with voltage
 

Último

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Último (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Defending against collaborative attacks by malicious nodes in manets a cooperative bait detection approach

  • 1. DEFENDING AGAINST COLLABORATIVE ATTACKS BY MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT DETECTION APPROACH Presented by IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in Ph: 9952077540
  • 2. Abstract • In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. • In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. • This project attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. • Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance metrics). www.iistechnologies.in Ph: 9952077540
  • 3. Existing System • The lack of any infrastructure added with the dynamic topology feature of MANETs make these networks highly vulnerable to routing attacks such as blackhole and grayhole (known as variants of blackhole attacks). • In blackhole attacks, a node transmits a malicious broadcast informing that it has the shortest path to the destination, with the goal of intercepting messages. • In this case, a malicious node (so-called blackhole node) can attract all packets by using forged Route Reply (RREP) packet to falsely claim that “fake” shortest route to the destination and then discard these packets without forwarding them to the destination. • In grayhole attacks, the malicious node is not initially recognized as such since it turns malicious only at a later time, preventing a trust-based security solution from detecting its presence in the network. • It then selectively discards/forwards the data packets when packets go through it. www.iistechnologies.in Ph: 9952077540
  • 4. Disadvantages www.iistechnologies.in Ph: 9952077540 • Higher energy consumption • Routing overhead • Increase time delay
  • 5. Proposed System www.iistechnologies.in Ph: 9952077540 • In this project, proposes a cooperative bait detection scheme (CBDS) is presented that effectively detects the malicious nodes that attempt to launch grayhole/collaborative blackhole attacks. • In our scheme, the address of an adjacent node is used as bait destination address to bait malicious nodes to send a reply RREP message, and malicious nodes are detected using a reverse tracing technique. • Any detected malicious node is kept in a blackhole list so that all other nodes that participate to the routing of the message are alerted to stop communicating with any node in that list. • Unlike previous works, the merit of CBDS lies in the fact that it integrates the proactive and reactive defense architectures to achieve the aforementioned goal.
  • 6. Advantages • Decrease the energy consumption • Decrease the time delay • Increase the throughput • Reduce the routing overhead www.iistechnologies.in Ph: 9952077540
  • 7. Flow Diagram www.iistechnologies.in Ph: 9952077540 Bait Detection Scheme Send Bait location Send RREQ to one hop neighbor node Detect black hole attacker Use reverse tracing technique Update neighbor list Send Packet through the best path to Sink Receive RREP
  • 8. Conclusion www.iistechnologies.in Ph: 9952077540 • In this project, we have proposed a new mechanism (called the CBDS) for detecting malicious nodes in MANET’s under gray/collaborative blackhole attacks. • Our simulation results revealed that the CBDS outperforms the DSR, 2ACK, and BFTR schemes, chosen as benchmark schemes, in terms of routing overhead and packet delivery ratio.
  • 9. Future Work www.iistechnologies.in Ph: 9952077540 • Investigate the feasibility of adjusting our CBDS approach to address other types of collaborative attacks on MANETs. • Investigate the integration of the CBDS with other well-known message security schemes in order to construct a comprehensive secure routing framework to protect MANETs against miscreants.
  • 10. TOOLS AND SOFTWARE USED Software • Network simulator(NS2) Language • Object Oriented Tool Command Language(OTCL) • C++ www.iistechnologies.in Ph: 9952077540
  • 11. References • P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, “CBDS: A cooperative bait detection scheme to prevent malicious node forMANET based on hybrid defense architecture,” in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5. • S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved March 18, 2013).[ Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html • C. Chang, Y.Wang, and H. Chao, “An efficientMesh-based core multicast routing protocol onMANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229–239, Apr. 2007. • D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996. • I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727–2740. www.iistechnologies.in Ph: 9952077540
  • 12. Services Offered • Coding with Software’s • Documents • Video File • Skype classes(Online Support) • Team viewer Support(Online Support) • Future Enhancement • Paper writing • Support For Inter-National Conference paper publication. www.iistechnologies.in Ph: 9952077540
  • 13. Contact IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in