Studies on TBRPF Routing Algorithm and Detection of Routing Loop Attack in Mobile Ad-Hoc Network

被引:0
|
作者
Ghosh, Deboleena [1 ]
机构
[1] W Bengal Univ Technol, Calcutta Inst Engn & Management, Kolkata, India
关键词
MANET; TBRPF;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At present, the application Mobile Ad-hoc Network (MANET) is increasing at a steady pace. The basic problem with MANET lies in its ad hoc nature. The lack of infrastructures in MANET makes the detection and control of security hazards all the more difficult. In this paper, an attempt has been made to study the various attacks in MANET. The focus is mainly on the routing-loop attack which is one of the possible attacks in ad hoc networks. In a routing-loop attack, a packet may circulate around a loop for some time before its TTL (Time To Live) or Hop count field goes to zero. Even when only a small portion of the traffic enters these loops and only for a brief time, effect is impact on surrounding medium and traffic, thus degrading network performance. In order to prevent this kind of attack, it is crucial to detect the abnormality that occurs during the attack. In conventional schemes, anomaly detection is achieved by defining the normal state from static training data. However, in mobile ad hoc networks where the network topology dynamically changes, such static training method could not be used efficiently. In this paper, I propose an anomaly Detection scheme using dynamic training method in which sequence number of each packet in transit is calculated each time to discard an errant packet.
引用
收藏
页码:60 / 66
页数:7
相关论文
共 50 条
  • [1] The impact of resource consumption attack on mobile ad-hoc network routing
    Abdelhaq, Maha
    Alsaqour, Raed
    Al-Hubaishi, Mohammed
    Alahdal, Tariq
    Uddin, Mueen
    [J]. International Journal of Network Security, 2014, 16 (05) : 376 - 381
  • [2] A New Algorithm for Routing in Ad-hoc Network
    Zhang Jian
    [J]. Wuhan University Journal of Natural Sciences, 2003, (S1) : 269 - 278
  • [3] Capability Aware Routing Algorithm for Mobile Ad-Hoc Network in Workplace
    Roy, Sarbani
    Chatterjee, Dhrubajyoti
    Mukherjee, Nandini
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 102 - 107
  • [4] Routing Optimizing Algorithm of Mobile Ad-Hoc Network Based on Genetic Algorithm
    Wu Xiao-Yan
    Liu Yang
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1205 - 1211
  • [5] MIRA: Misleading Routing Attack in Mobile Ad-hoc Networks
    Kandah, Farah
    Singh, Yashaswi
    Zhang, Weiyi
    Wang, Tie
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [6] A Misleading active Routing Attack in Mobile Ad-hoc Networks
    Kandah, F.
    Singh, Y.
    Zhang, W.
    Wang, T.
    [J]. International Journal of Security and Networks, 2012, 7 (01) : 17 - 29
  • [7] Reliable routing algorithm in mobile Ad-hoc networks
    Guo, SS
    Yang, FC
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 723 - 733
  • [8] Centralized frame for routing in mobile ad-hoc network
    Bakht, H
    Merabti, M
    Askwith, B
    Wang, SW
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 613 - 616
  • [9] Energy Efficient Routing in Mobile Ad-hoc Network
    Rinku, Bava K.
    Manish, Patel M.
    Megha, Patel B.
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 48 - 53
  • [10] Self Congestion Prediction Algorithm for Efficient Routing in Mobile Ad-Hoc Network
    Kamatam, Govardhan Reddy
    Srinivas, Podili V. S.
    Sekharaiah, Chandra K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 745 - 750