Drop Attack

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 171 Experts worldwide ranked by ideXlab platform

Balamurugan Balusamy - One of the best experts on this subject based on the ideXlab platform.

  • Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
    IEEE Access, 2019
    Co-Authors: T. Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, Balamurugan Balusamy
    Abstract:

    Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet Drop Attacks. In selective Drop Attack, the neighboring nodes are not loyal in forwarding the messages to the next node. It is critical to identify the illegitimate node, which overloads the host node and isolating them from the network is also a complicated task. In this paper, we present a resistive to selective Drop Attack (RSDA) scheme to provide effective security against selective Drop Attack. A lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular Drop Attack. The RSDA protocol can be integrated with the many existing routing protocols for WANETs such as AODV and DSR. It accomplishes reliability in routing by disabling the link with the highest weight and authenticate the nodes using the elliptic curve digital signature algorithm. In the proposed methodology, the packet Drop rate, jitter, and routing overhead at a different pause time are reduced to 9%, 0.11%, and 45%, respectively. The packet Drop rate at varying mobility speed in the presence of one gray hole and two gray hole nodes are obtained as 13% and 14% in RSDA scheme.

Satish Arora - One of the best experts on this subject based on the ideXlab platform.

  • a key distribution and monitoring technique to detect and isolate selective packet Drop Attack in ad hoc network
    International Journal of Research, 2015
    Co-Authors: Jaspreet Kaur, Satish Arora
    Abstract:

    Wireless Networking is getting extremely dominant now a day as the user need wireless connectivity irrespective of their geographical location. Ad-hoc Network is decentralized, self-organizing and autonomous wireless network in which nodes can join or leave the network whenever they require. The term Ad-hoc means no fixed infrastructure i.e. Dynamic Topology. Aside from these features, Ad-hoc Networks endures from many security issues i.e. active and passive Attacks. To develop a mechanism that provides firm security and perceives the malicious node activity in the network. Allowing a secure communication between source and destination is one of major problem in ad-hoc network. This paper describes Key Distribution and Monitoring (KDAM) technique used to detect and isolate malicious node on selective path in AODV routing protocol and secure the channel. The technique provides enhancement over the previously defined methods in terms of delay, packet loss and throughput. The simulation is acted on Network Simulator-2.

T. Poongodi - One of the best experts on this subject based on the ideXlab platform.

  • Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
    IEEE Access, 2019
    Co-Authors: T. Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, Balamurugan Balusamy
    Abstract:

    Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet Drop Attacks. In selective Drop Attack, the neighboring nodes are not loyal in forwarding the messages to the next node. It is critical to identify the illegitimate node, which overloads the host node and isolating them from the network is also a complicated task. In this paper, we present a resistive to selective Drop Attack (RSDA) scheme to provide effective security against selective Drop Attack. A lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular Drop Attack. The RSDA protocol can be integrated with the many existing routing protocols for WANETs such as AODV and DSR. It accomplishes reliability in routing by disabling the link with the highest weight and authenticate the nodes using the elliptic curve digital signature algorithm. In the proposed methodology, the packet Drop rate, jitter, and routing overhead at a different pause time are reduced to 9%, 0.11%, and 45%, respectively. The packet Drop rate at varying mobility speed in the presence of one gray hole and two gray hole nodes are obtained as 13% and 14% in RSDA scheme.

Jaspreet Kaur - One of the best experts on this subject based on the ideXlab platform.

  • a key distribution and monitoring technique to detect and isolate selective packet Drop Attack in ad hoc network
    International Journal of Research, 2015
    Co-Authors: Jaspreet Kaur, Satish Arora
    Abstract:

    Wireless Networking is getting extremely dominant now a day as the user need wireless connectivity irrespective of their geographical location. Ad-hoc Network is decentralized, self-organizing and autonomous wireless network in which nodes can join or leave the network whenever they require. The term Ad-hoc means no fixed infrastructure i.e. Dynamic Topology. Aside from these features, Ad-hoc Networks endures from many security issues i.e. active and passive Attacks. To develop a mechanism that provides firm security and perceives the malicious node activity in the network. Allowing a secure communication between source and destination is one of major problem in ad-hoc network. This paper describes Key Distribution and Monitoring (KDAM) technique used to detect and isolate malicious node on selective path in AODV routing protocol and secure the channel. The technique provides enhancement over the previously defined methods in terms of delay, packet loss and throughput. The simulation is acted on Network Simulator-2.

Nimisha Patel - One of the best experts on this subject based on the ideXlab platform.

  • Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET
    Oriental journal of computer science and technology, 2017
    Co-Authors: Rajan Patel, Sumaiya Vhora, Nimisha Patel
    Abstract:

    Packet Drop (grayhole/blackhole) Attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this Attack for improving performance of network. This article provides the packet Drop Attack detection and prevention using RBDR (Rank Based Data Routing) for AOMDV routing protocol. The fields of RBDR are generated with routing information and analysis behavior of network for detecting the malicious paths. The scheme is to identify the malicious paths for preventing the packet Drop Attack and also able to find the trusted multiple disjoint loop free routes for data delivery in MANET. The simulation is conducted in NS2 using AOMDV reactive routing protocol and analyze with packet loss delivery, average end-to-end delay and packet delivery ratio. The proposed technique can reduce the effect of packet Drop Attack.

  • Rank Base Data Routing (RBDR) scheme using AOMDV: A proposed scheme for packet Drop Attack detection and prevention in MANET
    2015 IEEE International Conference on Electrical Computer and Communication Technologies (ICECCT), 2015
    Co-Authors: Sumaiya Vhora, Rajan Patel, Nimisha Patel
    Abstract:

    Packet Drop Attack is a one kind of denial of service Attack which is mainly occurs at a network layer in Mobile Ad Hoc Network. In Packet Drop Attack, Attacker discards the packet instead of forward it to final destination. It is necessary to detect and prevent this unpredictable Attack for improving the data transmission among mobile nodes. In this article, we investigated the various proposed schemes for packet Drop Attack and present a remarkable comparison among them. Finally, we have proposed a solution based on Rank Based Data Routing (RBDR) record to identify malicious behaviour in network. The RBDR is created with field of routing details to analysis the behaviour of network for detecting the malicious paths. The scheme is to identify the malicious paths for preventing the packet Drop Attack and also able to find the trusted multiple disjoint loop free routes for data delivery in MANET. The proposed scheme will be implemented in NS2 using AOMDV routing protocol.