Professional Documents
Culture Documents
Abstract
A MANET is a continuously self-configuring, infrastructure-less type network, which consists of number of mobile nodes
with wireless network interfaces. In order to make communication among nodes, the nodes demoniacally establish paths among
neighbouring nodes. Security in mobile adhoc network is a big challenge because many nodes perform many kinds of misbehaviour.
In this paper, the main focus is on collaborative attacks in MANET using CBDS approach. CBDS is a approach which consolidate
asset of proactive and reactive defense method in reverse tracing. In reverse tracing method we compare performance of CBDS
approach with DSR and AOMDV routing protocols.
Keywords - Cooperative bait detection scheme (CBDS), Dynamic Source Routing (DSR), Ad-hoc on-demand
Multipath Distance Vector (AOMDV), Black Hole
I Introduction
A MANET is a system of wireless mobile that
category of a self configuring network and rapidly developed
network which is composed of several movable nodes. Since
there is no fixed set of infrastructure and centralized
administration, Nodes in MANETs can join and leave the
network dynamically. Communication can be done through
Wi-Fi connection or alternative medium such as a cellular or
satellite communication, all of the transmission links are
established through wireless medium.
Transmission takes place in open medium makes the
MANETs more vulnerable to security attacks. The mobile
hosts dynamically establish paths among one another in order
to communicate. Therefore, the success of MANET
communication highly relies on the collaboration of the
involved mobile nodes. Such dynamism of MANET-based
architectures leads to wide variety of attacks.
The presence and collaboration [1]of hostile nodes
in the network may corrupt the routing process, causes the
malfunctioning of the network operations. The lack of
infrastructure in MANETs make the network highly
vulnerable to routing attacks such as black hole and gray
hole. MANET is widely used in military purpose, disaster
area, personal area network and so on. Some MANETs are
ISSN: 2395-1303
http://www.ijetjournal.org
Page 1
International Journal of Engineering and Techniques - Volume 2 Issue 3, May - June 2016
that measures in terms of packet delivery ratio and end to end
delay to be chosen by the destination node. If the behaviour
of the path deviates from a predefined behavior set for
conclusive good routes, the source node uses a new route.
The drawbacks of BFTR is that mischievous nodes may still
present in the new chosen route, and this scheme is prone to
repetitive route discovery processes, which may lead to
momentous routing overhead.
In [4], Liu et al. proposed a mechanism which uses concept
called 2ACK scheme, which is used for detection of routing
immorality in MANETs. In this scheme, two-hop
acknowledgement packets are sent in the opposite direction
of the routing path to indicate that the data packets have been
successfully received. A acknowledgment ratio(Rack)
parameter is also used to control the ratio of the received data
packets for which the acknowledgment is required. Here
proactive schemes is implemented and hence, produces
additional routing overhead regardless of the existence of
malicious nodes.
ISSN: 2395-1303
http://www.ijetjournal.org
Page 2
International Journal of Engineering and Techniques - Volume 2 Issue 3, May - June 2016
3)Reactive Defence Step: In reactive phase, we use two
routing approach. In first approach we use the DSR route
discovery
ry process is activated and in second approach
AOMDV route discovery process is activated. When the
route is established and if at the destination, it is found that
the packet delivery ratio significantly falls to the threshold,
the detection scheme would be triggered again to detect for
continuous maintenance and real-time
time reaction efficiency .
3) Average End-to-End
End Delay: This is dened
de
as the average
time taken for a packet to be transmitted from the source to
the destination.
Simulation Parameters
Parameters
Application Traffic
Transmission Rate
Radio Range
Packet Size
Channel Data Rate
Pause Time
Maximum Speed
Number of Nodes
Area
Malicious Node
MAC
Values
12CBR
64packets
716m
512bytes
11Mbps
0s
10m/s
40
1500m*1000m
2%
802.11
Simulation Scenario:
1.Simulation results are calculated for fixed number of node
,fixed percentage of malicious nodes, mobility speed at 10ms
and by varying routing algorithm in CBDS approach. Under
this scenario we can get to know the performance parameters
wrt to DSR and AOMDV algorithms.
hms.
2. Simulation results are calculated for fixed number of node
,fixed percentage of malicious nodes ,mobility speed at 30ms
and by varying routing algorithm in CBDS approach. Under
this scenario we can get to know the performance parameters
wrt to DSR
R and AOMDV algorithms.
Fig.2 CBDS Flow
Performance Evaluation :
We have compared the CBDS approach against DSR and
AOMDV routing protocol
1)Packet Delivery Ratio: This is dened as the
he ratio of the
number of packets received at the destination and the number
of packets sent by the source.
ISSN: 2395-1303
1303
http://www.ijetjournal.org
Page 3
International Journal of Engineering and Techniques - Volume 2 Issue 3, May - June 2016
ISSN: 2395-1303
1303
http://www.ijetjournal.org
Page 4
International Journal of Engineering and Techniques - Volume 2 Issue 3, May - June 2016
links.
ISSN: 2395-1303
1303
http://www.ijetjournal.org
Page 5
International Journal of Engineering and Techniques - Volume 2 Issue 3, May - June 2016
ISSN: 2395-1303
http://www.ijetjournal.org
Page 6