Abstract:Ahstrort-We introduce an ad hoc wireless mobile network that employs a hierarchical networking architecture. The network uses high capacity and IOU, capacity nodes. We present a topological synthesis algorithm that selects a subset of high capacity nodes to fomi a backbone nehvork. The latter consists of interconnected backbone nodes that intercommunicate across high power links, and also makes use of (airhome, ground and underwater) Uiimanned Vehicles (UVs). Each backbone node manages the allocation of commun… Show more
“…Most of these solutions deal with the detection of a single malicious node or require enormous resource in terms of time and cost for detecting co operative blackhole attacks. In addition, some of these methods require specific environments [5] or assumptions in order to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.…”
Abstract-In mobile ad hoc networks (MANETs), an essential necessity for the foundation of correspondence among hubs is that hubs ought to coordinate with each other. Within the sight of malicious hubs, this prerequisite may prompt genuine security worries; for occasion, such hubs may disturb the steering procedure. In this connection, counteracting or distinguishing pernicious hubs propelling gray hole or shared black hole assaults is a test. This paper endeavours to determine this issue by outlining a dynamic source steering (DSR)-based directing component, which is alluded to as the agreeable draw discovery plan (CBDS), that coordinates the upsides of both proactive and responsive guard structures. Our CBDS strategy actualizes an opposite following method to help in accomplishing the expressed objective. Recreation results are given, demonstrating that within the sight of noxious hub assaults, the CBDS beats the DSR, 2ACK, and best-exertion flaw tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements).
Keywords-Cooperative bait detection scheme (CBDS),dynamic source routing (DSR), mobile ad hoc network (MANET).
“…Most of these solutions deal with the detection of a single malicious node or require enormous resource in terms of time and cost for detecting co operative blackhole attacks. In addition, some of these methods require specific environments [5] or assumptions in order to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.…”
Abstract-In mobile ad hoc networks (MANETs), an essential necessity for the foundation of correspondence among hubs is that hubs ought to coordinate with each other. Within the sight of malicious hubs, this prerequisite may prompt genuine security worries; for occasion, such hubs may disturb the steering procedure. In this connection, counteracting or distinguishing pernicious hubs propelling gray hole or shared black hole assaults is a test. This paper endeavours to determine this issue by outlining a dynamic source steering (DSR)-based directing component, which is alluded to as the agreeable draw discovery plan (CBDS), that coordinates the upsides of both proactive and responsive guard structures. Our CBDS strategy actualizes an opposite following method to help in accomplishing the expressed objective. Recreation results are given, demonstrating that within the sight of noxious hub assaults, the CBDS beats the DSR, 2ACK, and best-exertion flaw tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements).
Keywords-Cooperative bait detection scheme (CBDS),dynamic source routing (DSR), mobile ad hoc network (MANET).
“…The motivation for analyzing mobile backbone networks is discussed in detail in [6], [8], [9]. Srinivas et al [8] define two types of nodes, which may be thought of as representing robotic agents: regular nodes, which have limited mobility and communication capability, and mobile backbone nodes, which have greater communication capability than regular nodes and which can be placed at arbitrary locations in order to provide communication support for the regular nodes.…”
Abstract-This paper presents new algorithms for conducting cooperative sensing using a mobile backbone network. This hierarchical sensing approach combines backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility and communication capability but which can sense the environment. In the framework of a cooperative exploration problem, a technique is developed for simultaneous placement and assignment of regular and mobile backbone nodes. This method, a generalization of existing techniques that only consider stationary regular nodes, optimally solves the simultaneous placement and assignment problem in computationally tractable time for problems of moderate size. For large-scale instances of this problem, a polynomial-time approximation algorithm is developed. This algorithm carries the benefit of a theoretical performance guarantee and also performs well in practice. Finally, the simultaneous placement and assignment technique is incorporated into a cooperative exploration algorithm, and its performance is shown to compare favorably with that of a benchmark based on existing assignment algorithms for mobile backbone networks.
“…Most of these solutions deal with the detection of a single malignant node or require enormous resource in terms of time and cost for detecting cooperative blackhole attacks. In addition, some of these methods require specific environments [4] or assumptions to operate. In general, detection mechanisms that have been proposed so far can be grouped into two broad categories.1) Proactive detection schemes [5]- [11] are schemes that need to constantly detect or monitor nearby nodes.…”
Because of the confinements of wired system in crisis circumstances like natural calamities, scope for wireless technology is expanded. Mobile Adhoc Networks technology provides more room for research. Due to the MANET characteristics, such as dynamic topology and infrastructure less, it can be stationed whenever and wherever required. Hence it can be used in many applications. In MANET, to establish the communication among the nodes, nodes should coadjutant to each other. Nodes may disrupt complete routing process in the presence of malignant nodes and this leads to serious security threat. In this context thwarting or detecting malignant nodes launching grayhole or collaborative blackhole attack is a challenge. This paper attempts to solve this issue by designing energy efficient and secured dynamic source routing mechanism, which is also cited as cooperative bait detection and defense scheme (CBDDS), which integrates the advantages of proactive and reactive defense architectures. Reverse tracing technique is used to achieve the stated goal. Design is simulated in the presence of malignant node attacks, the CBDDS outflanks as far as packet delivery ratio, end to end delay, throughput and routing overhead which are picked as execution measurements over the DSR and 2ACK directing convention picked as benchmarks.
General TermsCooperative bait detection and defense scheme, Collaborative blackhole attacks, Detection mechanism, Dynamic Source Routing, Grayhole attacks, malicious node, malignant node, mobile ad hoc network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.