ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 108 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Providing secure communication is one of important aspects in Mobile Ad hoc Networks (MANETs). Routing between Source and destination must be secure. Routing protocols helps to transfer the packets to destination. Routing Protocols are vulnerable to collaborative black hole attacks. When malicious nodes work together, to drop the packets called collaborative attacks, Blackhole attacks completely drops the packets in MANETs and also advertise that, it has minimum shortest path to destination. We propose a mechanism, Enhanced Cooperative Bait Detection Scheme (ECBDS) for preventing Collaborative blackhole attacks in MANETs. In this mechanism, integrates features of Dynamic Source Routing (DSR) and 2ACK protocols. ECBDS scheme merges the proactive and reactive defense architecture and ensure secure data transmission using Key Distribution Scheme shuffling Algorithm. In the initial stage it uses a proactive architecture, i. e. uses a Bait id concept for the detection of malicious nodes present in the network. Upon the completion of initial stage it switches to reactive defense strategy. The scheme comprises of three steps, the bait step, suspected path detection and the Confirmation Request. The bait approach attracts the malicious node to send a reply and in the next step detects the suspected path. The last step involves the destination requesting its neighbor to confirm if the path given is secure. To secure data transmission we use key distribution shuffling algorithm scheme and encryption using Key generated by KDC. The work is implemented in Network Simulator. Comparing performance of ECBDS with DSR and 2ACK. ECBDS simulation result shows increased packet delivery ratio, throughput and reduced End to End Delay ratio

Keywords: Black hole, Bait, DSR, 2ACK, MANET

Edition: Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

Share this Article

How to Cite this Article?

Abdul Jawad PP, Bismin Chacko, "ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158291, Volume 4 Issue 9, September 2015, 1148 - 1153

Enter Your Email Address




Similar Articles with Keyword 'Black hole'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Similar Articles with Keyword 'DSR'

Downloads: 101

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Similar Articles with Keyword '2ACK'

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article

Downloads: 184

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 15 - 20

Multi-hop Adaptive Link State Optimal Routing in Wireless Ad hoc Network

Nayan S. Jambhulkar, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Black'

Downloads: 2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Similar Articles with Keyword 'hole'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article



Top