IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 1, Issue 3, December 2010
Detecting Malicious Nodes For Secure Routing In MANETS Using Reputation Based Mechanism
Full Text(PDF, 3000)  PP.  
Santhosh Krishna B.V, Mrs.Vallikannu M.E
Black hole, Reputation, Flooding
Mobile ad-hoc networks (MANETS) are prone to a number of security threats. We incorporate our distributed reputation protocol within DSR and perform extensive simulations using a number of scenarios characterized by high node mobility, short pause time and highly sparse network in order to evaluate each of the design choices of our system. We focus on a single and multiple blackhole attacks but our design principles and results are applicable to a wider range of attacks such as grayhole, flooding attacks. Our implementation of blackhole comprises active routing misbehavior and forwarding misbehavior. We design and build our prototype over DSR and test it in NS-2 in the presence of variable active blackhole attacks in highly mobile and sparse networks.
[1] Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens “Mitigating Byzantine Attacks in Ad Hoc Wireless Networks”, ACM MobiCom, Aug-2000.

[2] Charles E.Perkins and Elizabeth M. Royer, “Ad hoc on demand distance vector (AODV) routing (Internet-Draft)”, Aug- 1998.

[3] Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness In Dynamic Adhoc Networks. In Proc. Of IEEE/ACM MobiHOC, 2002. IEEE.

[4] H. Yang, et al, ""SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks,"" IEEE Network, vol. 24, 2006, pp. 1-13.

[5] P. Michiardi and R. Molva, ""CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks"", Proc. IFIP CMS, 2002.

[6] S. Buchegger and J.-Y. Le Boudec, “A Robust Reputation System for P2P and Mobile Ad-hoc Networks,” Proc. 2nd Workshop Economics of Peer-to- Peer Systems, 2004

Untitled Page