Open Access   Article Go Back

Defence Scheme against Selfish Node Attack in Manet

Khushbu 1 , R.K. Bathla2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1547-1550, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.15471550

Online published on May 31, 2019

Copyright © Khushbu, R.K. Bathla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Khushbu, R.K. Bathla, “Defence Scheme against Selfish Node Attack in Manet,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1547-1550, 2019.

MLA Style Citation: Khushbu, R.K. Bathla "Defence Scheme against Selfish Node Attack in Manet." International Journal of Computer Sciences and Engineering 7.5 (2019): 1547-1550.

APA Style Citation: Khushbu, R.K. Bathla, (2019). Defence Scheme against Selfish Node Attack in Manet. International Journal of Computer Sciences and Engineering, 7(5), 1547-1550.

BibTex Style Citation:
@article{Bathla_2019,
author = {Khushbu, R.K. Bathla},
title = {Defence Scheme against Selfish Node Attack in Manet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1547-1550},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4448},
doi = {https://doi.org/10.26438/ijcse/v7i5.15471550}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.15471550}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4448
TI - Defence Scheme against Selfish Node Attack in Manet
T2 - International Journal of Computer Sciences and Engineering
AU - Khushbu, R.K. Bathla
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1547-1550
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
178 126 downloads 88 downloads
  
  
           

Abstract

Mobile Ad hoc network (MANET) suffers from different security issues. Ideally, not all nodes in MANET cooperate in forwarding packets because of non-malicious intention. This node is called selfish node and it behaves so due to its internal state such as limited energy concerns. Selfish nodes drop packets and that harms the process of routes establishment and relaying packets. They usually have a dynamic topology such that nodes can easily join or leave the network at any time and they move around freely which gives them the name Mobile Ad hoc Networks or MANETs. They have many potential applications, especially in military and rescue operations such as connecting soldiers in the battle field or establishing a temporary network in place of one which collapsed after a disaster like an earthquake. In these networks, besides acting as a host, each node also acts as a router and forwards packets to the correct node in the network once a route is established. To support this connectivity nodes use routing protocols such as AODV (Ad hoc On-Demand Distance Vector) or DSR (Dynamic Source Routing). Mobile ad-hoc networks are usually susceptible to different security threats and selfish attack is one of these. In Selfish attack, a malicious node which absorbs and drops all data packets and routing packets makes use of the vulnerabilities of the on demand route discovery protocols, such as AODV

Key-Words / Index Term

IDS, MANET, Security, Selfish node attack, DSR (Dynamic Source Routing), AODV (Ad hoc On-Demand Distance Vector)

References

[1]. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113- 197-6, pp. 255-265.
[2]. S. Buchegger, C. Tissieres, and J. Y. Le Boudec. “A test bed for misbehavior detection in mobile adhoc networks”. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
[3]. P. Michiardi and R. Molva. Core: “A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”,
[4]. A. Patcha and A. Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks”, Radio and Wireless Conference, 2003.
[5]. S. Bansal and M. Baker. “Observation-Based Cooperation Enforcement in Ad hoc Networks”, July
[6]. K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK:Preventing Selfishness in Mobile Ad hoc Networks,"
[7]. K.Vijaya “Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks,”
[8]. B. Awerbuch et al., “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,”
[9]. S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,”
[10]. H. Yang, X. Meng, and S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,”
[11]. Moy, J. Security Architecture for the Internet Protocol. RFC 2401, November 1998, Internet Society.
[12]. Mäki, S. Security Fundamentals in Ad Hoc Networking. Proceedings of the Helsinki University of Technology, Seminar on Internetworking - Ad Hoc Networks,
[13]. Perkins, C. Mobile Ad Hoc Networking Terminology Internet draft (expired).
[14]. Gaurav Soni, “a novel defence scheme against selfish node attack in manet”
[15]. Kamlesh Chandrawansh, “a novel defence scheme against selfish node attack in manet”