J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna
{"title":"防御manet中恶意节点的协同攻击:一种协同诱饵检测方法","authors":"J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna","doi":"10.1109/ICAMMAET.2017.8186703","DOIUrl":null,"url":null,"abstract":"Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"203","resultStr":"{\"title\":\"Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach\",\"authors\":\"J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna\",\"doi\":\"10.1109/ICAMMAET.2017.8186703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.\",\"PeriodicalId\":425974,\"journal\":{\"name\":\"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"203\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAMMAET.2017.8186703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAMMAET.2017.8186703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach
Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.