SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
DOI:10.5121/ijcsa.2013.3305 51
A NOVEL DEFENCE SCHEME AGAINST SELFISH
NODE ATTACK IN MANET
Gaurav Soni1
and Kamlesh Chandrawanshi2
1
Dept. of Computer Science & Engineering, TIT College, Bhopal, M.P, INDIA
gauravsoni.rits@gmail.com
2
Dept. of Computer Science & Engineering, BIST College, Bhopal, M.P, INDIA
kamlesh.vjti@gmail.com
ABSTRACT
Security is one of the major issue in wired and wireless network but due to the presence of centralized
administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to
the absence of centralized management and frequently changes in topology security is one of a major issue
in MANET. Only prevention methods for attack are not enough. In this paper a new Intrusion Detection
System (IDS) algorithm has proposed against selfish node attack in MANET. Here the behavior of selfish
node is unnecessary flooding the information in network and block all types of packets transferring
between the reliable nodes. Proposed IDS Algorithm identifies the behavior of selfish node and also
blocked their misbehavior activities. In case of selfish node attack network performance is almost
negligible but after applying IDS on attack network performance is enhanced up to 92% and provides 0%
Infection rate from attack.
KEYWORDS
IDS, Misbehavio, MANET, Security, Selfish node attack.
1. INTRODUCTION
A mobile ad hoc network (MANET) is a collection of mobile devices that can communicate with
each other without the use of a predefined infrastructure or centralized administration. In addition
to freedom of mobility, a MANET can be created quickly at a low cost, as it does not rely on
existing network infrastructure. Due to this suppleness, a MANET is very useful for applications
such as disaster relief, emergency operations, military service, maritime communications, vehicle
networks, business meetings, site networks, robot networks, and so on. In these networks, besides
acting as a host, each node also acts as a router and forwards packets to the correct node in the
network once a route is established nodes are able to transfer their information to other nodes. To
support this connectivity nodes use routing protocols such as Proactive routing protocols and
Reactive routing protocols. Proactive routing protocols such as Destination Sequence Distance
Vector (DSDV) protocol [1], nodes obtain routes by periodic exchange of topology information
in the foam of maintaining the routing table. Reactive routing protocols such as AODV (Ad hoc
On-Demand Distance Vector) [2] are ad hoc on demand routing protocols here nodes find out
routes if requires. In the route discovery process of AODV protocol, intermediate nodes are
responsible to connect a fresh path to the destination, sending discovery packets i.e RREQ (Route
request) packets to the neighbor nodes and the number of nodes that are in radio range of sender
will immediately respond to send back RREP (Route Reply) messages in network. If any the
number of nodes are that not reach to destination because of some limitations like node moves out
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
52
of range then in that case RERR (Route error) messages are generated. These error messages
confirm the possibilities of best route selection with minimum hop counts. In addition, AODV
enables intermediate nodes that have sufficiently fresh routes (with destination sequence number
equal or greater than the one in the RREQ) to generate and send an RREP to the source node.
Malicious node abuse this process and they instantly respond to the source node with fake
information as though they have a fresh enough path to the destination. Therefore source node
sends its data packets via this malicious node assuming it is a true path. Selfish node behavior
may also be due to damaged nodes dropping packets unintentionally. In any case, the end result
of the presence of a selfish node in the network is lost packets (both routing as well as data). In
our study, we simulated selfish node attacks in wireless ad hoc networks and evaluated their
effects on the network performance.
The paper organization is as follows: section 2 describes selfish node attack and related works
are described in section 3. Proposed Algorithm is described in section 4. Network simulation
results are presented in section 5 followed by conclusions in section 6.
2. SELFISH NODE ATTACK
Routing protocols are exposed to a variety of attacks. Selfish node attack is one such attack in
which a malicious node doing a routing misbehavior in the route discovery packets of the routing
protocol to advertise itself as having the shortest path to the node whose packets it wants to
intercept [3,4]. This attacks aims at modifying the routing protocol so that traffic flows through a
specific node controlled by the attackers. During the route discovery process, the source node
sends route discovery packets to the intermediate nodes to find fresh path to the intended
destination. Malicious nodes respond immediately to the source node as these nodes do not refer
the routing table and drop all the routing packets and also flooding the false information of
shortest route in network by that the number of nodes that are in radio range directly or indirectly
forwarded the routing as well as data packets in the network. The source node assumes that the
route discovery process is complete, ignores other route reply messages from other nodes and
selects the path through the malicious node to route the data packets. The malicious nodes do this
by assigning a high sequence number to the reply packet. In an ad-hoc network that uses the
AODV protocol, a Selfish node absorbs the network traffic and drops all packets. To explain the
Selfish Node we added a malicious node that exhibits Selfish behavior and capture the UDP
packet and block the TCP packet or can’t forward the TCP data to actual destination.
In a Selfish Node, after a while, the sending node understands that there is a link error because the
receiving node does not send TCP ACK packets. If it sends out new TCP data packets and
discovers a new route for the destination, the selfish node still manages to mislead the sending
node. If the sending node sends out UDP data packets the problem is not detected because the
UDP data connections do not wait for the ACK packets.
3. RELATED WORK
Standard Recently, a lot of research has focused on the cooperation issue in MANET. Several
related issues are briefly presented here.
Khairul Azmi et al [5] present a new mechanism to detect selfish node. Each node is expected to
contribute to the network on the continual basis within a time frame. Those which fail will
undergo a test for their suspicious behavior. This scheme is also a based on monitor node. A
monitoring node hears a request from its neighbouring node to forward a data packet; it will first
check the time difference between last request and last action and status of the requestor.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
53
Performance metrics are not measures in this paper now in present work we include the infection
ratio and performance metrics. Future work of [5] like acknowledgement detail and their loss are
also measure.
Al Shurman et al [6] have proposed two different solutions for black hole. The first solution
suggests unicasting a ping packet from source to destination through multiple routes and then
chooses a safe route based on the acknowledgement received. The second solution is based on
keeping track of sequence numbers. But these solutions have a longer delay and lower number of
verified routes.
Misbehavior detection and reaction are described in [7], by Marti, Giuli, Lai and Baker. The
paper presents two extensions to the DSR algorithm: the watchdog and the path rater. The
watchdog identifies misbehaving nodes by listening promiscuously to the next node transmission
but not detect misbehavior in presence of ambiguous collisions, receiver collisions, limited
transmission power, false misbehavior and partial dropping.
This technique is imperfect due to collisions, limited transmit power and partial dropping.
Buchegger and Le Boudec [8] present the CONFIDANT protocol. Each node monitor the
behaviour of its next hop neighbors in a similar manner to watchdog. Deciding the criteria for
maintaining the friends list by Trust Manager is difficult.
CORE (Collaborative Reputation) [9] is a reputation based system proposed by Michiardi et al
similar to CONFIDANT. The limitation with CORE is that the most reputed nodes may become
congested as most of the routes are likely to pass through them. Also the limitations of the
monitoring system in networks with limited transmission power and directional antennas have not
been addressed in CORE.
Patcha et al [10] have proposed a collaborative architecture for black hole prevention as an
extension to the watchdog method.
Bansal et al [11] have proposed a protocol called OCEAN (Observation-based Cooperation
Enforcement in Ad hoc Networks), which is the enhanced version of DSR protocol. OCEAN uses
a monitoring system and a reputation system to identify malicious nodes. But OCEAN fails to
deal with misbehaving nodes properly. These papers have addressed the black hole attack
problem on unicast routing protocols.
Balakrishnan [12] has proposed a TWOACK scheme which can be implemented as an add-on to
any source routing protocol. Instead of detecting particular misbehaving node, TWOACK scheme
detects misbehaving link and then seeks to alleviate the problem of routing misbehavior by
notifying the routing protocol to avoid them in future routes. It is done by sending back a
TWOACK packet on successful reception of every data packet, which is assigned a fixed route of
two hops in the direction opposite to that of data packets. Basic drawback of this scheme includes
it cannot distinguish exactly which particular node is misbehaving node. Sometime well behaving
nodes became part of misbehaving link and therefore cannot be further used the network. Thus a
lot of well behaved node may be avoided by network which results in losing of well behaved
routes.
Vijaya [13] proposed another acknowledgement based scheme similar to TWOACK scheme This
scheme detects the misbehaving link, eliminate it and choose the other path for transmitting the
data. The main idea is to send 2ACK packet which is assigned a fixed route of two hops back in
the opposite direction of the data traffic route and to reduce the additional routing overhead, a
fraction of the data packets will be acknowledged via a 2ACK packet. This scheme also consists
of multicasting method by which sender can broadcast information of misbehaving nodes so that
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
54
other nodes can avoid path containing misbehaving nodes and take another path for the data
transmission. Although routing overhead caused by transmission of acknowledgement packets is
minimized but this scheme also suffers to detect the particular misbehaving node.
Usha and Radha [14] proposed Ack is better than TWOACK scheme, in which each send a
normal Ack to its immediate source node after receipt of any kind of packet. This scheme
requires an end to end Ack packet (i.e. Nack) to be sent between the source and the destination.
Possible drawback includes lot of routing overhead because of Ack and Nack packets. Also due
to nodes mobility probability of Nack packet reaching to source becomes smaller with the large
number of intermediate nodes between source and destination.
Zeshan [15] proposed a two-fold approach for detection and isolation of nodes that drops data
packets. First approach attempts to detect the misbehavior of nodes and will identify the
malicious activity in network. It is done by sending an ACK packet by each intermediate node to
its source node for confirming the successful reception of data packets. Other approach identifies
exactly which intermediate node is doing malicious activity. It is done by monitoring the
intermediate nodes of active route by the nodes near to active path which lies in their transmission
range and by the nodes which are on the active route. When number of dropped packets by a
particular node exceeds certain threshold, the monitoring node in that range declares that node as
misbehaving node and broadcast this information in the network by that all the normal nodes are
aware about the attacker. Main disadvantage of this scheme includes the overhead due to
transmissions of acknowledgement packets by every intermediate node to the source and working
of all nodes in promiscuous mode.
4. PROPOSED ALGORITHM
4.1. Algorithm for Selfish Node Creation and prevention
Set mobile node = M //Total Mobile Nodes
Set source node = S //S Є M
Set Destination Node = D // D Є M
Set Routing Protocol =AODV
Start simulation time = t0
Set radio range = rr; //initialize radio range
RREQ_B(S, D, rr ) // broadcast for communication and send request packet to D node
{
If ((rr<=250) && (next hop >0))
{
Compute route ()
{
rtable->insert(rtable->rt_nexthop); //nexthop to RREQ source
if (dest==true)
{ send ack to source node with rtable;
Data_packet_send(s_no, nexthop, type)
}
else {
destination not found;
}
}
}
else { destination un-reachable ;
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
55
}
}
Selfish_Node () //Selfish Node Work
{
Check (incoming packet)
{ If (pkt == ‘Routing’)
{Capture and updated destination field ;
Send route ACK to sender;
}
Else if (pkt == ‘TCP’)
{Block TCP packet }
Else If {pkt ==’UDP’}
{Capture UDP packet;
Can’t Send to Destination;
}
Else ( pkt ==’other’)
{Drop; }
Set (false_pkt= (scan_rate * pkts_max_) / selfish node); // false packet send’s to all normal
node
Selfish_Broadcast (inf_pkt, nexthop)
{
Set priority = 1 // Higher priority
Send false_pkt = 100 pkts/ms // greater than the limit
Find (number of pkt accepted node)
}
4.2. IDS for Elimination of Selfishness Algorithm
Set IDS node = p ; // IDS node
Set routing =AODV ;
RREQ_B(p, n, rr) // broadcast for communication and send request packet to all n nodes
via p node
{
If ((rr<=250) && (next hop >0))
{
Set false_pks_rm (removal) = ( scan_rate *pkt s_max_ / selfish node); // false packet disable
module
If (false_rm => 100)
{ Selfish Node Block ; }
Check_Selfishness (S,D,M)
{
If ((node € M) && (pkt < 100 pkts/ms)
{
pkt accepted by neighbor;
pkt_Accept_limit();
}
Else { Node_Selfish()
{ can’t accept by neighbor ;
Block pkts sender ;
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
56
}}}
If (any node belong is in radio range && receives that request packet && heavy load node)
{ Node l = week node // l є n
Check load of Node l ;
If (load > normal load)
{ false_pkts_rm = 1;
{ Node infection remove via false_pkts_rm parameter ;
}}
}
Node unreachable;
}
Node out of range;
}
4.3. Algorithm Description.
Behavior of selfish node is to be defined in first point of this section this attack drops all the
packets in the network routing, TCP and UDP. The selfish node behavior are also explained in the
foam of generating false packets in the network. The scan rate is calculated with maximum
number of packets suppose number of nodes having capability of packets handling are 10 and
scan rate is that capability of nodes in terms of time means in seconds or microseconds then
suppose this is 1000 pktsps now divide the number of value of false packets by number of
selfish node in the network. The value comes after calculation is the number of false packets in
actual generate by each selfish node in the network.
An intrusion-detection system (IDS) can be defined as the tools, methods, and resources to help
identify, assess, and report unauthorized or unapproved network activity. Intrusion detection is
typically one part of an overall protection system that is installed around a system or device—it is
not a stand-alone protection measure. In our simulation module we apply IDS module that protect
through the selfish node behavior if Selfish node in the range of IDS. Very first IDS check which
node update the routing table and send higher sequence number to the sender node, if find out so
IDS sends the message to the sender node for elimination of that particular path where belongs
selfish node and search new route according to IDS instruction. Here IDS internal module
provides only protection of misbehave and provide trust communication between sender and
destination. After prevention we detect selfish node via trace analysis and provide secure
communication in MANET.
In our approach we have inbuilt IDS module with AODV routing and Selfish behavior module.
Very first we attach IDS and Selfish module in the NS-2 package and update the make file
through following command:
selfish/selfish_logs.o selfish/selfish.o selfish/selfish_rtable.o
selfish/selfish_rqueue.oidsaodv/idsaodv_logs.oidsaodv/idsaodv_rtable.o
idsaodv/idsaodv_rqueue.o idsaodv/idsaodv.o
After that we update the packet.h file through PT_idsAODV= "IDSAODV"; and PT_selfish=
"Selfish"; and compile the internal module if new object file generated then we create TCL (tool
command language script) for the scenario creation and create the MANET scenario, TCL invoke
the new module Selfish and IDS module and gives the behavior according to selfish and IDS
module. Then we create two different type of Output file name as .tr (trace file) and .nam
(network animator file) through TCL script. Trace file contain each information in particular
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
57
discrete event of simulation and that file passes to awk (abstract window tool kit) and get the
output in the form of routing overhead, throughput, average end-to-end delay etc.
Here we create three module names as AODV simple routing, IDS (intrusion detection and
prevention system) module and selfish module step by step
5. SIMULATION ENVIRONMENT
The detailed simulation model is based on network simulator-2 (ver-2.31) [16], is used in the
evaluation. The NS instructions can be used to define the topology structure of the network and
the motion mode of the nodes, to configure the service source and the receiver to create the
statistical data trace file and so on. Performance metrics are calculated from trace file (.tr), that
has contained the all simulation information.
5.1. Simulation Parameters for Case Study.
In our scenario we take 30 nodes in which nodes 1-27 are simple nodes, and node 29 is a
malicious nodes or Selfish node and node 28 is an IDS node. The simulation is done using ns-2,
to analyze the performance of the network by varying the nodes mobility. The evaluated
performances are given below. We are taking the following parameters for case study shown in
table 1. Note down selfish nodes are consider one in case of attack to visualized the effect of
attack but after applying IDS scheme consider the selfish nodes are two (29 and 14) to see the
secure effect of IDS in network.
Table 1. Simulation Parameters for Case Study.
Number of nodes 30
Selfish node 1 or 2
IDS Node 1
Dimension of simulated area 800×600
Routing Protocol AODV
Simulation time (seconds) 100
Transmission Range 250m
Traffic type CBR
Packet size (bytes) 512
Number of traffic connections (TCP or UDP) 20
Maximum Speed (m/s) 30
5.2. The Performance Metrics
In this paper we focus on evaluating the protocols under Selfish node or malicious nodes
attack and measure the network performance after applying intrusion detection system with
following criteria [2, 3, 8, 9, and 13].
1. Packet Delivery Fraction (PDF): The ratio of data the delivered to the destination to
the data send out by source.
2. Throughput: Numbers of packets send or received in per unit of time.
3. Normalized routing overhead: This is the ratio of routing-related transmissions (RREQ,
RREP, RERR etc) to data transmissions in a simulation. .
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
58
4. End to End Delay: The difference in the time it takes for a sent packet and to reach the
destination.
5.3. Results
In this section we present a set of simulation experiments to evaluate this protocol by
comparing with the original AODV [5]
5.3.1. PDF Analysis in case of Attack and IDS
In this graph we observe that in case of attack only at time about 5 sec the PDF value is 65 but
after that the PDF percentage continuously decreases and reach up to 15 %. But after applying
IDS The PDF continuously increases w.r.t to time it means that IDS node will block the
misbehavior activity of selfish node and also providing the shortest and secure path to nodes by
that they the PDF is about 92% in presence of IDS. This one is the important parameter to
measure the network performance in network layer because if the number of packets is
successfully delivered in the network then definitely the packet loss is minimum. By applying
IDS we recover about 75% data delivery in network; this one is huge loss in attack case.
Figure1. PDF analysis in case of attack and IDS
5.3.2. Normalized Routing Overhead Analysis
This graph has show the routing load analysis in case of attack and IDS. Here we clearly observe
the effect of attack in network. In case of attack only about 1000 packets are delivered because
remaining packets are drop by selfish node then in case of attack NRL is minimum. But after
applying IDS a normal secure routing packets delivered in network and also deliver successfully
data between the nodes. Now in case of a IDS about 6000 routing packets are delivered, this is
about 6 times higher than attack.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
59
Figure 2. NRL analysis in case of attack and IDS
5.3.3. Throughput Analysis
Throughput analysis in in case of attack clearly show that the throughput in case of attack is
negligible but after applying IDS number of packets send in network are continuously increases
by that throughput are increases. Here we see that at the time about 22 seconds throughput is
negligible in case of attack and IDS but after that in IDS case throughput increases up to 42
packets are send in per unit of time. Now in IDS case throughput is about 100% as compare to
attack. The throughput value in graph is not visualized because it is less than 1.
Figure 3. Throughput analysis in case of attack and IDS
5.3.4. Infection Percentage
Infection percentage represents the infection percentage w.r.t time. Infection percetage in case of
attack are continuously increases reach up to 42%. At time about after 4 sec. the infection are in
maximum percentage value but at the time of IDS the infection percentage is zero and not a
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
60
single packet is affected by selfish node attack.IDS will block the whole activity of selfish node
and remove the infection from network.
Figure 4. Infection Percentage in case of attack and IDS
Table 2 represents the effect of attack in TCP packets. Here the node 29 are drop the highest
number of packets and remaining nodes are not deliver actual number of packets in network
because most of the route request packets dropped by selfish node.
Table 2. TCP Packet Analysis in Case of Attack
Sender
Node
Packets
Sends
Receiver
Node
Packets
Receives
Packets Drop
by Node
Drop
Packets
0 19 7 8 29 67
2 27 11 6
5 7 19 3
6 6 21 1
22 20 24 1
25 7 -
Packets send
= 86
Packets
receive = 19
TCP acknowledgement (Ack) details are given in table 3. Here it is clear that a negligible number
of Ack are received by sender nodes. Now attacker drops about all the Ack packets and Ack drop
by node field is nil it means that Ack are lost by attacker. There is no information in network
which nodes are drop the Ack packets.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
61
Table 3. TCP Acknowledgement Packet Analysis in Case of Attack
Ack receiver Node Ack packets
receives
Ack drop by
Node
Ack Drop
0 3 - -
2 6
5 1
22 8
25 1
Total Ack. receives 19
IDS scheme really show the actual performance of network which is shown in table 4.This table
clearly show how many data packets are transfer, receive and drop in between sender, receiver
and intermediate nodes.
Table 4. TCP Packet Analysis in Case of IDS
Sender
Node
Packets
Sends
Receiver
Node
Packets
Receives
Packets
Drop by
Node
Drop
Packets
0 729 7 1415 0 9
2 414 11 401 1 10
5 161 19 306 2 9
6 310 21 695 5 3
22 1458 24 28 6 10
25 42 28 147 8 4
10 10
13 1
14 2
17 2
22 37
23 3
25 18
26 1
Packets
send = 3114
Packets
receive =
2992
Packet
Drop
119
The table 5 is showing the actual information about the Ack. packets send by receiver and
intermediate nodes in network. As compare to attack case here the almost all Ack. packets are
receive. In both Ack. tables there is no information about attacker node because their behaviors
are not normal as other node.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
62
Table 5. TCP Acknowledgement Packet Analysis in Case of IDS
Ack Node Ack Packets
Receives
Ack drop by Node Ack Drop
0 653 0 9
2 352 1 8
5 124 2 1
6 289 7 23
22 1385 8 2
25 19 11 36
12 11
17 6
19 33
20 9
23 5
24 12
25 2
26 1
28 9
Total ACK
Receives
2822 ACK. Drop 167
6. CONCLUSION AND FUTURE WORK
Finally after visualize the results, it can be concluded that the Selfish node effect on performance
metrics. Effect on packet loss is clearly visualized in PDF and throughput. As malicious node is
the main security threat that effect the performance of the AODV routing protocol. Its detection is
the main matter of concern. The acknowledgement(ACK) of TCP represents that due to fake
information in network most of the senders are not obtain the ACK from receiver means all the
ACK are lost and after applying IDS scheme every node that take part in routing will show the
information of ACK packets.
Therefore the proposed IDS scheme work will be excellent to detect and defense the network
from Selfish node attack. In Future we also detect the effect of selfish attack in performance
matrices and also Selfish node for AODV can be implemented in real life scenario and its
analysis can be compared with the analysis results.
REFERENCES
[1] Charles E, G. He "Destination Sequenced Distance Vector (DSDV) Protocol"
http//www.citeseer.ist.psu.edu/531710.html, 2003C.
[2] Hao Yang, Haiyun Luo. Fan Ye, Songwu Lu, and Lixia Zhang. “Security in mobile ad hoc networks:
Challenges and solutions”. IEEE Wireless Communications , February 2004.
[3] Shree Murthy and J. J. Garcia-Luna-Aceves. “An Efficient Routing Protocol for Wireless Networks”.
Mobile Networks and Applications, 1(2):183–197, 1996.
[4] Y-C Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Sec. and Privacy,
May–June 2004.
[5] Khairul Azmi, Abu Bakar and James Irvine. " A Scheme for Detecting Selfish Nodes in MANET
using OMNET++", 2010 Sixth International Conference on Wireless and Mobile Communications,
pp 411-414, 2010.
[6] Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks, ACM Southeast
Regional Conference”, 2004, pp. 96-97.
International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013
63
[7] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc
networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking
(MobiCom), ISBN 1-58113- 197-6, pp. 255-265.
[8] S. Buchegger, C. Tissieres, and J. Y. Le Boudec. “A test bed for misbehavior detection in mobile ad-
hoc networks”. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available
on:citeseer.ist.psu.edu/645200.html.
[9] P. Michiardi and R. Molva. Core: “A Collaborative Reputation Mechanism to Enforce Node
Cooperation in Mobile Ad Hoc Networks”, In Proceedings of the 6th IFIP Communications and
Multimedia Security Conference, pages 107 121, Portorosz, Slovenia, September 2002.
[10] A. Patcha and A. Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in
Mobile Ad hoc Networks”, Radio and Wireless Conference, 2003. RAWCON ’03, Proceedings, pp.
75-78, 10-13 Aug. 2003.
[11] S. Bansal and M. Baker. “Observation-Based Cooperation Enforcement in Ad hoc Networks”, July
2003. Available on: http://arxiv.org/pdf/cs.NI/0307012.
[12] K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK:Preventing Selfishness in Mobile Ad hoc
Networks," inProc. of Wireless Communications and NetworkingConference (WCNC’05), vol. 4,
March 2005, pp. 2137-2142.
[13] K.Vijaya “Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks,” TENCON 2008, IEEE
Region 10 Conference, November 2008, pp. 1-7.
Authors
1) Gaurav Soni He is working as Assistant Professor in Technocrats Institute of
Technology Engineering College, Bhopal, Madhya Pradesh, (M.P), India. He did his
Bachelor degree in Computer Science. He finished his Master of Engineering in Computer
Science department from RITS, Bhopal. Their area of interest is Mobile Ad hoc Network.
He is Attended four International Conferences and one national conference & Published one
paper in international conference.
2) Kamlesh Chandrawanshi He is working as Assistant Professor in Bansal Institute of
Science & Technology Engineering College, Bhopal, Madhya Pradesh (M.P), India. He
did his Bachelor degree in Computer Science. He finished his Master of Engineering in
Computer Science from VJTI, Mumbai. Their area of interest is Wireless Network &
Sensor Network. He is published seven research papers in international conference &
Published one paper in national conference.

More Related Content

What's hot

An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkAnbarasu S
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication Systemijsrd.com
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocoleSAT Publishing House
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 

What's hot (19)

An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
F04503057062
F04503057062F04503057062
F04503057062
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh network
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication System
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocol
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 

Viewers also liked

Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)113068
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (6)

Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Case Studies (Questions and Answers)
Case Studies (Questions and Answers)Case Studies (Questions and Answers)
Case Studies (Questions and Answers)
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Novel Defence Scheme Against Selfish Node Attack in MANET

TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONijscai
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionIJARIIT
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 

Similar to Novel Defence Scheme Against Selfish Node Attack in MANET (20)

TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
E0392031034
E0392031034E0392031034
E0392031034
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
560 229-237
560 229-237560 229-237
560 229-237
 
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
IMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTIONIMAGE GENERATION FROM CAPTION
IMAGE GENERATION FROM CAPTION
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
Review on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and PreventionReview on Grey- Hole Attack Detection and Prevention
Review on Grey- Hole Attack Detection and Prevention
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
K1803036872
K1803036872K1803036872
K1803036872
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Novel Defence Scheme Against Selfish Node Attack in MANET

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 DOI:10.5121/ijcsa.2013.3305 51 A NOVEL DEFENCE SCHEME AGAINST SELFISH NODE ATTACK IN MANET Gaurav Soni1 and Kamlesh Chandrawanshi2 1 Dept. of Computer Science & Engineering, TIT College, Bhopal, M.P, INDIA gauravsoni.rits@gmail.com 2 Dept. of Computer Science & Engineering, BIST College, Bhopal, M.P, INDIA kamlesh.vjti@gmail.com ABSTRACT Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new Intrusion Detection System (IDS) algorithm has proposed against selfish node attack in MANET. Here the behavior of selfish node is unnecessary flooding the information in network and block all types of packets transferring between the reliable nodes. Proposed IDS Algorithm identifies the behavior of selfish node and also blocked their misbehavior activities. In case of selfish node attack network performance is almost negligible but after applying IDS on attack network performance is enhanced up to 92% and provides 0% Infection rate from attack. KEYWORDS IDS, Misbehavio, MANET, Security, Selfish node attack. 1. INTRODUCTION A mobile ad hoc network (MANET) is a collection of mobile devices that can communicate with each other without the use of a predefined infrastructure or centralized administration. In addition to freedom of mobility, a MANET can be created quickly at a low cost, as it does not rely on existing network infrastructure. Due to this suppleness, a MANET is very useful for applications such as disaster relief, emergency operations, military service, maritime communications, vehicle networks, business meetings, site networks, robot networks, and so on. In these networks, besides acting as a host, each node also acts as a router and forwards packets to the correct node in the network once a route is established nodes are able to transfer their information to other nodes. To support this connectivity nodes use routing protocols such as Proactive routing protocols and Reactive routing protocols. Proactive routing protocols such as Destination Sequence Distance Vector (DSDV) protocol [1], nodes obtain routes by periodic exchange of topology information in the foam of maintaining the routing table. Reactive routing protocols such as AODV (Ad hoc On-Demand Distance Vector) [2] are ad hoc on demand routing protocols here nodes find out routes if requires. In the route discovery process of AODV protocol, intermediate nodes are responsible to connect a fresh path to the destination, sending discovery packets i.e RREQ (Route request) packets to the neighbor nodes and the number of nodes that are in radio range of sender will immediately respond to send back RREP (Route Reply) messages in network. If any the number of nodes are that not reach to destination because of some limitations like node moves out
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 52 of range then in that case RERR (Route error) messages are generated. These error messages confirm the possibilities of best route selection with minimum hop counts. In addition, AODV enables intermediate nodes that have sufficiently fresh routes (with destination sequence number equal or greater than the one in the RREQ) to generate and send an RREP to the source node. Malicious node abuse this process and they instantly respond to the source node with fake information as though they have a fresh enough path to the destination. Therefore source node sends its data packets via this malicious node assuming it is a true path. Selfish node behavior may also be due to damaged nodes dropping packets unintentionally. In any case, the end result of the presence of a selfish node in the network is lost packets (both routing as well as data). In our study, we simulated selfish node attacks in wireless ad hoc networks and evaluated their effects on the network performance. The paper organization is as follows: section 2 describes selfish node attack and related works are described in section 3. Proposed Algorithm is described in section 4. Network simulation results are presented in section 5 followed by conclusions in section 6. 2. SELFISH NODE ATTACK Routing protocols are exposed to a variety of attacks. Selfish node attack is one such attack in which a malicious node doing a routing misbehavior in the route discovery packets of the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept [3,4]. This attacks aims at modifying the routing protocol so that traffic flows through a specific node controlled by the attackers. During the route discovery process, the source node sends route discovery packets to the intermediate nodes to find fresh path to the intended destination. Malicious nodes respond immediately to the source node as these nodes do not refer the routing table and drop all the routing packets and also flooding the false information of shortest route in network by that the number of nodes that are in radio range directly or indirectly forwarded the routing as well as data packets in the network. The source node assumes that the route discovery process is complete, ignores other route reply messages from other nodes and selects the path through the malicious node to route the data packets. The malicious nodes do this by assigning a high sequence number to the reply packet. In an ad-hoc network that uses the AODV protocol, a Selfish node absorbs the network traffic and drops all packets. To explain the Selfish Node we added a malicious node that exhibits Selfish behavior and capture the UDP packet and block the TCP packet or can’t forward the TCP data to actual destination. In a Selfish Node, after a while, the sending node understands that there is a link error because the receiving node does not send TCP ACK packets. If it sends out new TCP data packets and discovers a new route for the destination, the selfish node still manages to mislead the sending node. If the sending node sends out UDP data packets the problem is not detected because the UDP data connections do not wait for the ACK packets. 3. RELATED WORK Standard Recently, a lot of research has focused on the cooperation issue in MANET. Several related issues are briefly presented here. Khairul Azmi et al [5] present a new mechanism to detect selfish node. Each node is expected to contribute to the network on the continual basis within a time frame. Those which fail will undergo a test for their suspicious behavior. This scheme is also a based on monitor node. A monitoring node hears a request from its neighbouring node to forward a data packet; it will first check the time difference between last request and last action and status of the requestor.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 53 Performance metrics are not measures in this paper now in present work we include the infection ratio and performance metrics. Future work of [5] like acknowledgement detail and their loss are also measure. Al Shurman et al [6] have proposed two different solutions for black hole. The first solution suggests unicasting a ping packet from source to destination through multiple routes and then chooses a safe route based on the acknowledgement received. The second solution is based on keeping track of sequence numbers. But these solutions have a longer delay and lower number of verified routes. Misbehavior detection and reaction are described in [7], by Marti, Giuli, Lai and Baker. The paper presents two extensions to the DSR algorithm: the watchdog and the path rater. The watchdog identifies misbehaving nodes by listening promiscuously to the next node transmission but not detect misbehavior in presence of ambiguous collisions, receiver collisions, limited transmission power, false misbehavior and partial dropping. This technique is imperfect due to collisions, limited transmit power and partial dropping. Buchegger and Le Boudec [8] present the CONFIDANT protocol. Each node monitor the behaviour of its next hop neighbors in a similar manner to watchdog. Deciding the criteria for maintaining the friends list by Trust Manager is difficult. CORE (Collaborative Reputation) [9] is a reputation based system proposed by Michiardi et al similar to CONFIDANT. The limitation with CORE is that the most reputed nodes may become congested as most of the routes are likely to pass through them. Also the limitations of the monitoring system in networks with limited transmission power and directional antennas have not been addressed in CORE. Patcha et al [10] have proposed a collaborative architecture for black hole prevention as an extension to the watchdog method. Bansal et al [11] have proposed a protocol called OCEAN (Observation-based Cooperation Enforcement in Ad hoc Networks), which is the enhanced version of DSR protocol. OCEAN uses a monitoring system and a reputation system to identify malicious nodes. But OCEAN fails to deal with misbehaving nodes properly. These papers have addressed the black hole attack problem on unicast routing protocols. Balakrishnan [12] has proposed a TWOACK scheme which can be implemented as an add-on to any source routing protocol. Instead of detecting particular misbehaving node, TWOACK scheme detects misbehaving link and then seeks to alleviate the problem of routing misbehavior by notifying the routing protocol to avoid them in future routes. It is done by sending back a TWOACK packet on successful reception of every data packet, which is assigned a fixed route of two hops in the direction opposite to that of data packets. Basic drawback of this scheme includes it cannot distinguish exactly which particular node is misbehaving node. Sometime well behaving nodes became part of misbehaving link and therefore cannot be further used the network. Thus a lot of well behaved node may be avoided by network which results in losing of well behaved routes. Vijaya [13] proposed another acknowledgement based scheme similar to TWOACK scheme This scheme detects the misbehaving link, eliminate it and choose the other path for transmitting the data. The main idea is to send 2ACK packet which is assigned a fixed route of two hops back in the opposite direction of the data traffic route and to reduce the additional routing overhead, a fraction of the data packets will be acknowledged via a 2ACK packet. This scheme also consists of multicasting method by which sender can broadcast information of misbehaving nodes so that
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 54 other nodes can avoid path containing misbehaving nodes and take another path for the data transmission. Although routing overhead caused by transmission of acknowledgement packets is minimized but this scheme also suffers to detect the particular misbehaving node. Usha and Radha [14] proposed Ack is better than TWOACK scheme, in which each send a normal Ack to its immediate source node after receipt of any kind of packet. This scheme requires an end to end Ack packet (i.e. Nack) to be sent between the source and the destination. Possible drawback includes lot of routing overhead because of Ack and Nack packets. Also due to nodes mobility probability of Nack packet reaching to source becomes smaller with the large number of intermediate nodes between source and destination. Zeshan [15] proposed a two-fold approach for detection and isolation of nodes that drops data packets. First approach attempts to detect the misbehavior of nodes and will identify the malicious activity in network. It is done by sending an ACK packet by each intermediate node to its source node for confirming the successful reception of data packets. Other approach identifies exactly which intermediate node is doing malicious activity. It is done by monitoring the intermediate nodes of active route by the nodes near to active path which lies in their transmission range and by the nodes which are on the active route. When number of dropped packets by a particular node exceeds certain threshold, the monitoring node in that range declares that node as misbehaving node and broadcast this information in the network by that all the normal nodes are aware about the attacker. Main disadvantage of this scheme includes the overhead due to transmissions of acknowledgement packets by every intermediate node to the source and working of all nodes in promiscuous mode. 4. PROPOSED ALGORITHM 4.1. Algorithm for Selfish Node Creation and prevention Set mobile node = M //Total Mobile Nodes Set source node = S //S Є M Set Destination Node = D // D Є M Set Routing Protocol =AODV Start simulation time = t0 Set radio range = rr; //initialize radio range RREQ_B(S, D, rr ) // broadcast for communication and send request packet to D node { If ((rr<=250) && (next hop >0)) { Compute route () { rtable->insert(rtable->rt_nexthop); //nexthop to RREQ source if (dest==true) { send ack to source node with rtable; Data_packet_send(s_no, nexthop, type) } else { destination not found; } } } else { destination un-reachable ;
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 55 } } Selfish_Node () //Selfish Node Work { Check (incoming packet) { If (pkt == ‘Routing’) {Capture and updated destination field ; Send route ACK to sender; } Else if (pkt == ‘TCP’) {Block TCP packet } Else If {pkt ==’UDP’} {Capture UDP packet; Can’t Send to Destination; } Else ( pkt ==’other’) {Drop; } Set (false_pkt= (scan_rate * pkts_max_) / selfish node); // false packet send’s to all normal node Selfish_Broadcast (inf_pkt, nexthop) { Set priority = 1 // Higher priority Send false_pkt = 100 pkts/ms // greater than the limit Find (number of pkt accepted node) } 4.2. IDS for Elimination of Selfishness Algorithm Set IDS node = p ; // IDS node Set routing =AODV ; RREQ_B(p, n, rr) // broadcast for communication and send request packet to all n nodes via p node { If ((rr<=250) && (next hop >0)) { Set false_pks_rm (removal) = ( scan_rate *pkt s_max_ / selfish node); // false packet disable module If (false_rm => 100) { Selfish Node Block ; } Check_Selfishness (S,D,M) { If ((node € M) && (pkt < 100 pkts/ms) { pkt accepted by neighbor; pkt_Accept_limit(); } Else { Node_Selfish() { can’t accept by neighbor ; Block pkts sender ;
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 56 }}} If (any node belong is in radio range && receives that request packet && heavy load node) { Node l = week node // l є n Check load of Node l ; If (load > normal load) { false_pkts_rm = 1; { Node infection remove via false_pkts_rm parameter ; }} } Node unreachable; } Node out of range; } 4.3. Algorithm Description. Behavior of selfish node is to be defined in first point of this section this attack drops all the packets in the network routing, TCP and UDP. The selfish node behavior are also explained in the foam of generating false packets in the network. The scan rate is calculated with maximum number of packets suppose number of nodes having capability of packets handling are 10 and scan rate is that capability of nodes in terms of time means in seconds or microseconds then suppose this is 1000 pktsps now divide the number of value of false packets by number of selfish node in the network. The value comes after calculation is the number of false packets in actual generate by each selfish node in the network. An intrusion-detection system (IDS) can be defined as the tools, methods, and resources to help identify, assess, and report unauthorized or unapproved network activity. Intrusion detection is typically one part of an overall protection system that is installed around a system or device—it is not a stand-alone protection measure. In our simulation module we apply IDS module that protect through the selfish node behavior if Selfish node in the range of IDS. Very first IDS check which node update the routing table and send higher sequence number to the sender node, if find out so IDS sends the message to the sender node for elimination of that particular path where belongs selfish node and search new route according to IDS instruction. Here IDS internal module provides only protection of misbehave and provide trust communication between sender and destination. After prevention we detect selfish node via trace analysis and provide secure communication in MANET. In our approach we have inbuilt IDS module with AODV routing and Selfish behavior module. Very first we attach IDS and Selfish module in the NS-2 package and update the make file through following command: selfish/selfish_logs.o selfish/selfish.o selfish/selfish_rtable.o selfish/selfish_rqueue.oidsaodv/idsaodv_logs.oidsaodv/idsaodv_rtable.o idsaodv/idsaodv_rqueue.o idsaodv/idsaodv.o After that we update the packet.h file through PT_idsAODV= "IDSAODV"; and PT_selfish= "Selfish"; and compile the internal module if new object file generated then we create TCL (tool command language script) for the scenario creation and create the MANET scenario, TCL invoke the new module Selfish and IDS module and gives the behavior according to selfish and IDS module. Then we create two different type of Output file name as .tr (trace file) and .nam (network animator file) through TCL script. Trace file contain each information in particular
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 57 discrete event of simulation and that file passes to awk (abstract window tool kit) and get the output in the form of routing overhead, throughput, average end-to-end delay etc. Here we create three module names as AODV simple routing, IDS (intrusion detection and prevention system) module and selfish module step by step 5. SIMULATION ENVIRONMENT The detailed simulation model is based on network simulator-2 (ver-2.31) [16], is used in the evaluation. The NS instructions can be used to define the topology structure of the network and the motion mode of the nodes, to configure the service source and the receiver to create the statistical data trace file and so on. Performance metrics are calculated from trace file (.tr), that has contained the all simulation information. 5.1. Simulation Parameters for Case Study. In our scenario we take 30 nodes in which nodes 1-27 are simple nodes, and node 29 is a malicious nodes or Selfish node and node 28 is an IDS node. The simulation is done using ns-2, to analyze the performance of the network by varying the nodes mobility. The evaluated performances are given below. We are taking the following parameters for case study shown in table 1. Note down selfish nodes are consider one in case of attack to visualized the effect of attack but after applying IDS scheme consider the selfish nodes are two (29 and 14) to see the secure effect of IDS in network. Table 1. Simulation Parameters for Case Study. Number of nodes 30 Selfish node 1 or 2 IDS Node 1 Dimension of simulated area 800×600 Routing Protocol AODV Simulation time (seconds) 100 Transmission Range 250m Traffic type CBR Packet size (bytes) 512 Number of traffic connections (TCP or UDP) 20 Maximum Speed (m/s) 30 5.2. The Performance Metrics In this paper we focus on evaluating the protocols under Selfish node or malicious nodes attack and measure the network performance after applying intrusion detection system with following criteria [2, 3, 8, 9, and 13]. 1. Packet Delivery Fraction (PDF): The ratio of data the delivered to the destination to the data send out by source. 2. Throughput: Numbers of packets send or received in per unit of time. 3. Normalized routing overhead: This is the ratio of routing-related transmissions (RREQ, RREP, RERR etc) to data transmissions in a simulation. .
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 58 4. End to End Delay: The difference in the time it takes for a sent packet and to reach the destination. 5.3. Results In this section we present a set of simulation experiments to evaluate this protocol by comparing with the original AODV [5] 5.3.1. PDF Analysis in case of Attack and IDS In this graph we observe that in case of attack only at time about 5 sec the PDF value is 65 but after that the PDF percentage continuously decreases and reach up to 15 %. But after applying IDS The PDF continuously increases w.r.t to time it means that IDS node will block the misbehavior activity of selfish node and also providing the shortest and secure path to nodes by that they the PDF is about 92% in presence of IDS. This one is the important parameter to measure the network performance in network layer because if the number of packets is successfully delivered in the network then definitely the packet loss is minimum. By applying IDS we recover about 75% data delivery in network; this one is huge loss in attack case. Figure1. PDF analysis in case of attack and IDS 5.3.2. Normalized Routing Overhead Analysis This graph has show the routing load analysis in case of attack and IDS. Here we clearly observe the effect of attack in network. In case of attack only about 1000 packets are delivered because remaining packets are drop by selfish node then in case of attack NRL is minimum. But after applying IDS a normal secure routing packets delivered in network and also deliver successfully data between the nodes. Now in case of a IDS about 6000 routing packets are delivered, this is about 6 times higher than attack.
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 59 Figure 2. NRL analysis in case of attack and IDS 5.3.3. Throughput Analysis Throughput analysis in in case of attack clearly show that the throughput in case of attack is negligible but after applying IDS number of packets send in network are continuously increases by that throughput are increases. Here we see that at the time about 22 seconds throughput is negligible in case of attack and IDS but after that in IDS case throughput increases up to 42 packets are send in per unit of time. Now in IDS case throughput is about 100% as compare to attack. The throughput value in graph is not visualized because it is less than 1. Figure 3. Throughput analysis in case of attack and IDS 5.3.4. Infection Percentage Infection percentage represents the infection percentage w.r.t time. Infection percetage in case of attack are continuously increases reach up to 42%. At time about after 4 sec. the infection are in maximum percentage value but at the time of IDS the infection percentage is zero and not a
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 60 single packet is affected by selfish node attack.IDS will block the whole activity of selfish node and remove the infection from network. Figure 4. Infection Percentage in case of attack and IDS Table 2 represents the effect of attack in TCP packets. Here the node 29 are drop the highest number of packets and remaining nodes are not deliver actual number of packets in network because most of the route request packets dropped by selfish node. Table 2. TCP Packet Analysis in Case of Attack Sender Node Packets Sends Receiver Node Packets Receives Packets Drop by Node Drop Packets 0 19 7 8 29 67 2 27 11 6 5 7 19 3 6 6 21 1 22 20 24 1 25 7 - Packets send = 86 Packets receive = 19 TCP acknowledgement (Ack) details are given in table 3. Here it is clear that a negligible number of Ack are received by sender nodes. Now attacker drops about all the Ack packets and Ack drop by node field is nil it means that Ack are lost by attacker. There is no information in network which nodes are drop the Ack packets.
  • 11. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 61 Table 3. TCP Acknowledgement Packet Analysis in Case of Attack Ack receiver Node Ack packets receives Ack drop by Node Ack Drop 0 3 - - 2 6 5 1 22 8 25 1 Total Ack. receives 19 IDS scheme really show the actual performance of network which is shown in table 4.This table clearly show how many data packets are transfer, receive and drop in between sender, receiver and intermediate nodes. Table 4. TCP Packet Analysis in Case of IDS Sender Node Packets Sends Receiver Node Packets Receives Packets Drop by Node Drop Packets 0 729 7 1415 0 9 2 414 11 401 1 10 5 161 19 306 2 9 6 310 21 695 5 3 22 1458 24 28 6 10 25 42 28 147 8 4 10 10 13 1 14 2 17 2 22 37 23 3 25 18 26 1 Packets send = 3114 Packets receive = 2992 Packet Drop 119 The table 5 is showing the actual information about the Ack. packets send by receiver and intermediate nodes in network. As compare to attack case here the almost all Ack. packets are receive. In both Ack. tables there is no information about attacker node because their behaviors are not normal as other node.
  • 12. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 62 Table 5. TCP Acknowledgement Packet Analysis in Case of IDS Ack Node Ack Packets Receives Ack drop by Node Ack Drop 0 653 0 9 2 352 1 8 5 124 2 1 6 289 7 23 22 1385 8 2 25 19 11 36 12 11 17 6 19 33 20 9 23 5 24 12 25 2 26 1 28 9 Total ACK Receives 2822 ACK. Drop 167 6. CONCLUSION AND FUTURE WORK Finally after visualize the results, it can be concluded that the Selfish node effect on performance metrics. Effect on packet loss is clearly visualized in PDF and throughput. As malicious node is the main security threat that effect the performance of the AODV routing protocol. Its detection is the main matter of concern. The acknowledgement(ACK) of TCP represents that due to fake information in network most of the senders are not obtain the ACK from receiver means all the ACK are lost and after applying IDS scheme every node that take part in routing will show the information of ACK packets. Therefore the proposed IDS scheme work will be excellent to detect and defense the network from Selfish node attack. In Future we also detect the effect of selfish attack in performance matrices and also Selfish node for AODV can be implemented in real life scenario and its analysis can be compared with the analysis results. REFERENCES [1] Charles E, G. He "Destination Sequenced Distance Vector (DSDV) Protocol" http//www.citeseer.ist.psu.edu/531710.html, 2003C. [2] Hao Yang, Haiyun Luo. Fan Ye, Songwu Lu, and Lixia Zhang. “Security in mobile ad hoc networks: Challenges and solutions”. IEEE Wireless Communications , February 2004. [3] Shree Murthy and J. J. Garcia-Luna-Aceves. “An Efficient Routing Protocol for Wireless Networks”. Mobile Networks and Applications, 1(2):183–197, 1996. [4] Y-C Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Sec. and Privacy, May–June 2004. [5] Khairul Azmi, Abu Bakar and James Irvine. " A Scheme for Detecting Selfish Nodes in MANET using OMNET++", 2010 Sixth International Conference on Wireless and Mobile Communications, pp 411-414, 2010. [6] Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference”, 2004, pp. 96-97.
  • 13. International Journal on Computational Sciences & Applications (IJCSA) Vol.3, No.3, June 2013 63 [7] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113- 197-6, pp. 255-265. [8] S. Buchegger, C. Tissieres, and J. Y. Le Boudec. “A test bed for misbehavior detection in mobile ad- hoc networks”. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html. [9] P. Michiardi and R. Molva. Core: “A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107 121, Portorosz, Slovenia, September 2002. [10] A. Patcha and A. Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks”, Radio and Wireless Conference, 2003. RAWCON ’03, Proceedings, pp. 75-78, 10-13 Aug. 2003. [11] S. Bansal and M. Baker. “Observation-Based Cooperation Enforcement in Ad hoc Networks”, July 2003. Available on: http://arxiv.org/pdf/cs.NI/0307012. [12] K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK:Preventing Selfishness in Mobile Ad hoc Networks," inProc. of Wireless Communications and NetworkingConference (WCNC’05), vol. 4, March 2005, pp. 2137-2142. [13] K.Vijaya “Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks,” TENCON 2008, IEEE Region 10 Conference, November 2008, pp. 1-7. Authors 1) Gaurav Soni He is working as Assistant Professor in Technocrats Institute of Technology Engineering College, Bhopal, Madhya Pradesh, (M.P), India. He did his Bachelor degree in Computer Science. He finished his Master of Engineering in Computer Science department from RITS, Bhopal. Their area of interest is Mobile Ad hoc Network. He is Attended four International Conferences and one national conference & Published one paper in international conference. 2) Kamlesh Chandrawanshi He is working as Assistant Professor in Bansal Institute of Science & Technology Engineering College, Bhopal, Madhya Pradesh (M.P), India. He did his Bachelor degree in Computer Science. He finished his Master of Engineering in Computer Science from VJTI, Mumbai. Their area of interest is Wireless Network & Sensor Network. He is published seven research papers in international conference & Published one paper in national conference.