Detection and Prevention of Sinkhole attack in Manet
|
International Journal of Computer Trends and Technology (IJCTT) | |
© 2017 by IJCTT Journal | ||
Volume-48 Number-2 |
||
Year of Publication : 2017 | ||
Authors : Jeewan Jyoti | ||
DOI : 10.14445/22312803/IJCTT-V48P111 |
Jeewan Jyoti "Detection and Prevention of Sinkhole attack in Manet". International Journal of Computer Trends and Technology (IJCTT) V48(2):45-50, June 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Mobile ad hoc networks are popular networks used broadly due to their dynamic nature. These types of networks are suffered from the sinkhole attack as there is no centralized security management. We will discuss the problems in on-going communication by sinkhole attack in this paper. Sinkhole attack is in MANET is important security problem. A Sinkhole attack is one type of attack in network layer. The data is attracted by sinkhole from the neighboring nodes and then it fake the routing information which make the node which make the local area network know its way on specific node. So, sinkhole tries to attract all the network traffic to itself. Therefore, it alerts the data packet or drops the packet mutely. In this paper we determine one of the most severe routing attacks in adhoc network namely the sinkhole attack.
References
[1] Jeba veer singh jebadurai, Alfred raja melvin A, Immanuel john raja jebadurai, "Sinkhole detection in mobile ad hoc network using mutual understanding among nodes". India. IEEE-2011.
[2] Kisung Kim and Sehun Kim, “A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks”
[3] C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc networks,” in Proc. Securecomm Workshops, 2006, pp. 1–11
[4] Roopali Garg, Himika harma ”Proposed Lightweight Sybil Attack Detection Technique in MANET” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 3, Issue 5, May 2014
[5] Satyendra Singh, Vinod Kumar Yadav, Ganesh Chandra, & Rahul Kumar Gangwar, “ An Efficient and Improving the Security of AODV Routing Protocol” IJCST Vol. 3, Issue 1, Jan. - March 2012.
[6] Nidhi Joshi,Prof Manoj Challa,”Secure Authentication Protocol to Detect Sybil Attacks in MANETs” International Journal of Computer Science & Engineering Technology (IJCSET), ISSN : 2229- 3345 Vol. 5 No. 06 Jun 2014
[7] Sohail Abbas, Madjid Merabti, David Llewellyn Jones, and Kashif Kifayat,” Lightweight Sybil Attack Detection in MANETs”, IEEE systems journal, vol. 7, no. 2, June 2013.
[8] Yamini D Malkhede,Purnima Selokar “ANALYSIS OF SYBIL ATTACK DETECTION IN MOBILE ADHOC NETWORK” Proceedings of 19 th IRF International Conference , 1st February 2015, Pune, India, ISBN: 978-93-84209-85-8.
[9] P.Kavitha, C.Keerthana, V.Niroja, V.Vivekanandhan,” Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network”, International Journal of Communication and Computer Technologies Volume 02–No.02 Issue: 02 March 2014.
[10] Saurabh, ShekharTandanandPraneet. "A PDRR based detection technique for blackhole attack in MANET.",2011.
[11] Nath, Ira, and DrRituparnaChaki. "BHAPSC: A New SYBIL Attack Prevention System in Clustered MANET." International Journal of Advanced Research in Computer Science and Software Engineering 2012.
[12] Bhosle, Amol, TusharThosar and SnehalMehatre. "Black-hole and wormhole attack in routing protocol AODV in MANET." International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol 2 (2012).
[13] Gagandeep, Aashima, Pawan Kumar, “Study on Sinkhole Attacks in Wireless Ad hoc Networks”, International Journal on Computer Science and Engineering (IJCSE), Volume-4, Issue-5, June 2012
[14] Rupinder Singh Brar and Harneet Arora," Mobile Agent Security issue in Wireless Sensor Networks ", Issue 1, January 2013(IJARCSSE).
[15] H. Shen and X.-G. Ye, “Research on the location attack based on multiple counterfeit identities tech-nology in sensor networks," in 2014 International Conference on Wireless Communication and Sensor Network (WCSN), pp. 193-197, IEEE, 2014.
[16] L. Tamilselvan and Dr. V.Sankaranarayanan,,“Prevention of Black hole Attacks in MANET”, In The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 2007 IEEE.
[17] M. Zapata and N. Asokan, “Securing Ad-hoc Routing Protocols”, In Proc. of ACM Workshop on Wireless Security (WiSe), Atlanta, GA, Sept. 2002.
Keywords
In this paper we determine one of the most severe routing attacks in adhoc network namely the sinkhole attack.