A Proposal Mechanism Against the Attacks: Cooperative Blackhole, Blackmail, Overflow and Selfish in Routing Protocol of Mobile Ad Hoc Network

被引:0
|
作者
Konate, Karim [1 ]
Gaye, Abdourahime [1 ]
机构
[1] Univ Cheikh Anta DIOP, Dept Math & Comp, Dakar, Senegal
关键词
Mobile Ad Hoc; Routing; Security; Attacks; Reputation; Blackhole cooperative; Blackmail; Overflow; Selfish;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it as well as its vulnerabilities. Our work ends with a proposal to fend off some of these attacks like Blackhole cooperative, Blackmail, Overflow, Selfish and an implementation of this solution on a compiler of C named Dev.-C++ in order to make comparative tests with the mechanisms already proposed.
引用
收藏
页码:69 / 80
页数:12
相关论文
共 50 条
  • [1] EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks
    Kancharakuntla, Deepika
    El-Ocla, Hosam
    [J]. ELECTRONICS, 2022, 11 (21)
  • [2] A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Obaidat, Mohammad S.
    Peddi, Rajender Dheeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 420 - 428
  • [3] Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
    Moudni, Houda
    Er-Rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 385 - 389
  • [4] Securing Energy Routing Protocol Against Black Hole Attacks in Mobile Ad-Hoc Network
    Rajendra Prasad P.
    Shankar S.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (09) : 2843 - 2853
  • [5] Securing Data Forwarding against Blackhole Attacks in Mobile Ad Hoc Networks
    Elmahdi, Elbasher
    Yoo, Seong-Moo
    Sharshembiev, Kumar
    [J]. 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 463 - 467
  • [6] A New Routing Protocol in Mobile Ad Hoc Networks with Selfish Nodes
    Saremi, Fatemeh
    Mousavi, Hamid
    Movaghar, Ali
    [J]. 2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 114 - 118
  • [7] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    [J]. 2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [8] A cooperative multicast routing protocol for mobile ad hoc networks
    Lee, I-Ta
    Chiou, Guann-Long
    Yang, Shun-Ren
    [J]. COMPUTER NETWORKS, 2011, 55 (10) : 2407 - 2424
  • [9] Novel Routing Protocol for Mobile Ad hoc Networks with Selfish and Altruistic Nodes
    Kampitaki, Dimitra G.
    Economides, Anastasios A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2016, : 170 - 174
  • [10] The improvement of mobile ad hoc network routing protocol
    Liu, Jianfei
    Qiao, Yanhua
    Du, Qing
    Liu, Juan
    [J]. IC-BNMT 2007: Proceedings of 2007 International Conference on Broadband Network & Multimedia Technology, 2007, : 158 - 162