Open Access Open Access  Restricted Access Subscription or Fee Access

To Detect and Overcome Sinkhole Attack in Mobile Ad-hoc Network

Vivek Tank, Amit Lathigara

Abstract


Mobile ad-hoc network abbreviated as MANET is most emerging and highly demanding wireless network technology. Due to the property of self-deliberate, where all points of network behave like source or router and also, all nodes keep on moving freely in network area. Mobile ad hoc network performs important role in connectionless environment. Security is the most fundamental requirement in mobile ad hoc network to secure the sensitive information from hackers. In MANETs typically many attacks are routing protocol attacks. Sinkhole attack is one of the most severe attacks in MANETs. It tries to attract all neighbor nodes to itself and broadcasts fake or bogus routing path. Here sinkhole attack describes in AODV routing protocol for applying security by using digital signature and hash chain to prevent the attack.

Cite this Artilce
Vivek Tank, Amit Lathigara. To Detect and Overcome Sinkhole Attack in Mobile Ad hoc Network. Journal of Mobile Computing, Communications and Mobile Networks. 2015; 2(3): 1–8p.


Keywords


Sinkhole attack, mobile ad hoc network, routing protocol, security, digital signature

Full Text:

PDF

References


Thanachai T, Tapanan Y, Punthep S. Adaptive Sinkhole Detection on Wireless Ad Hoc Networks. Assumption University, Thailand, IEEE. 2006.

Kim K, Kim S. A Sinkhole Detection Method based on Incremental Learning in Wireless Ad hoc Networks.

Gangdeep, Aashima, Pawan Kumar. Analysis of Different Security Attacks in MANETs on Protocol Stack-A Review. International Journal of Engineering Advanced Technology (IJEAT). Jun 2012; 1(5). ISSN: 2249-8958.

Gagandeep, Aashima, Pawan Kumar. Study on Sinkhole Attacks in Wireless Ad hoc Networks. International Journal on Computer Science and Engineering(IJCSE). Jun 2012; 4(5). ISSN: 0975-3397.

Usha G, Bose S. Impact of Sinking behaviour in Mobile Ad hoc Network. International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC). Jun 2012; 3(3).

Madhumathi R, Jenno Richi Benat J. Attacks in Mobile Adhoc Networks: Detection and Counter Measure. International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN). 2012; 2(1). ISSN No. 2248-9738 (Print).

Khusboo Tunwal, Priyanka Singh Dabi, Pankaj Sharma. An Individual Trust Management Technique for Mitigating Sinkhole Attack in MANET. International Journal of Computer Application. Jun 2014; 95(24). 0975-8887.

Culpepper Benjamin J, Chris Tseng H. Sinkhole Intrusion Indicators in DSR MANET. First International Conference on Broadband Networks IEEE. 2004.

Marchang N, Datta R. Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks. Ad hoc Networks; Elsevier-2008. 2008; 6: 508–523p.

Gisung Kim, Younggoo Han, Sehun Kim. A Cooperative-Sinkhole Detection Method for Mobile Ad hoc Networks. International Journal of Electronics and Communication. 2010; 64: 390–397p.

Woochul Shim, Gisung Kim, Sehun Kim. A Distributed Sinkhole Detection Method using Cluster Analysis. Elsevier. 2010. 0957-4174.

Nisarg Gandewar, Rahila Patel. Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network. Fourth International Conference on CICN, IEEE. 2012.

Mishra T, Singh B, Kumar A. A Security Scheme for Mobile Ad-hoc Network with

Reduced Routing Overhead. IJARCSSE Journal. Aug 2013; 3(8).

Reyzin L, Reyzin N. Better than BIBA: Short One Time Signatures With Fast Signing and Verifying. 7th Australasian Conference on Information Security and Privacy, LNCS 2384. Apr 2002.

Zapata M. Key Management and Delayed Verification for Ad-hoc Networks. High Speed Networks. Jan 2006; 15(1).

Shidi Xu, Yi Mu, Susilo W. Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. Journal of Networks. May 2006; 1(1).

Immanuel John Raja Jebadurai, Elijah Blessing Rajasingh. A Survey on Sinkhole Attack Detection Methods in Mobile Ad hoc Networks. 3rd International Conference on Machine Learning and Computing (ICMLC 2011)-IEEE. 2011. 978-1-4244-925 3-4.

Jeba Veer Singh Jebadurai, Alfred Raja Melvin A, Immanuel John Raja Jebadurai. Sinkhole Detection in Mobile Ad hoc Network using Mutual Understanding among Nodes. India; IEEE. 2011.

Ad hoc On-Demand Distance Vector (AODV) Routing ietf-draft-manet-aodv-13.txt.

Mouhamad Ibrahim. Introduction to Network Simulator.

NS-2. The NS Manual (Formally Known as NS Documentation). Available at: http://www.isi.edu/nsnam/ns/do


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/