Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach

J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna
{"title":"Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach","authors":"J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna","doi":"10.1109/ICAMMAET.2017.8186703","DOIUrl":null,"url":null,"abstract":"Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"203","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAMMAET.2017.8186703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 203

Abstract

Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.
防御manet中恶意节点的协同攻击:一种协同诱饵检测方法
由于移动电话的广泛可及性,便携式特别指定系统(manet)通常用于不同的基本应用,例如军事紧急行动和危机准备和反应行动。这主要是因为它们的框架属性较差。在MANET中,每个集线器既充当主机,又充当交换机。在获取信息的同时,集线器还需要彼此协作来转发信息束,沿着这些线路构建远程邻居。从安全的角度来看,这些不寻常的因素同样伴随着真正的缺点。毫无疑问,前面提到的应用程序对系统拓扑、转向和信息活动的安全性施加了一些严格的要求。例如,系统中有害集线器的接近和共同努力可能会干扰指挥过程,导致系统操作的中断。引入了一个系统[所谓的合作诱饵检测方案(CBDS)],该系统可以充分识别那些试图调度灰洞/社区导向黑洞攻击的报复性中心。在该策略中,利用相邻集线器的地址作为诱捕目标,向恶意集线器发送应答RREP消息,并利用反向跟踪策略识别恶意集线器。任何杰出的有害中心都保存在黑洞列表中,以便每个对信息指挥感兴趣的其他中心都被警告停止与该纲要中的任何中心交谈。为了解决这一问题,研究人员提出了一种基于动态源转向(DSR)的定向系统,即CBDS,该系统结合了主动防御和接收防御设计的优点。我们的CBDS策略执行一种跟随方法来帮助实现既定目标。将给出模拟结果,证明在有害的枢纽攻击范围内,CBDS在包裹运输比例和指挥开销(作为执行测量)方面优于DSR、2ACK和最佳负荷容错转向(BFTR)惯例(作为基准)。此外,期望1)研究改变我们的CBDS方法来处理对manet的不同类型的合作攻击的可实现性;2)探索CBDS与其他确定理解的消息安全情节的结合,牢记最终目标是开发一个深远的安全指导结构,以确保manet免受流氓攻击。同时,通过在ns2中的复制来展示我们计划的优点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信