SlideShare a Scribd company logo
DEFENDING AGAINST COLLABORATIVE ATTACKS BY
MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT
DETECTION APPROACH
Presented by
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in
Ph: 9952077540
Abstract
• In mobile ad hoc networks (MANETs), a primary requirement for the establishment of
communication among nodes is that nodes should cooperate with each other. In the presence of
malevolent nodes, this requirement may lead to serious security concerns; for instance, such
nodes may disrupt the routing process.
• In this context, preventing or detecting malicious nodes launching grayhole or collaborative
blackhole attacks is a challenge.
• This project attempts to resolve this issue by designing a dynamic source routing (DSR)-based
routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that
integrates the advantages of both proactive and reactive defense architectures.
• Our CBDS method implements a reverse tracing technique to help in achieving the stated goal.
Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS
outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as
benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance
metrics).
www.iistechnologies.in
Ph: 9952077540
Existing System
• The lack of any infrastructure added with the dynamic topology feature of MANETs make these
networks highly vulnerable to routing attacks such as blackhole and grayhole (known as variants
of blackhole attacks).
• In blackhole attacks, a node transmits a malicious broadcast informing that it has the shortest
path to the destination, with the goal of intercepting messages.
• In this case, a malicious node (so-called blackhole node) can attract all packets by using forged
Route Reply (RREP) packet to falsely claim that “fake” shortest route to the destination and then
discard these packets without forwarding them to the destination.
• In grayhole attacks, the malicious node is not initially recognized as such since it turns malicious
only at a later time, preventing a trust-based security solution from detecting its presence in the
network.
• It then selectively discards/forwards the data packets when packets go through it.
www.iistechnologies.in
Ph: 9952077540
Disadvantages
www.iistechnologies.in
Ph: 9952077540
• Higher energy consumption
• Routing overhead
• Increase time delay
Proposed System
www.iistechnologies.in
Ph: 9952077540
• In this project, proposes a cooperative bait detection scheme (CBDS) is presented that effectively
detects the malicious nodes that attempt to launch grayhole/collaborative blackhole attacks.
• In our scheme, the address of an adjacent node is used as bait destination address to bait
malicious nodes to send a reply RREP message, and malicious nodes are detected using a reverse
tracing technique.
• Any detected malicious node is kept in a blackhole list so that all other nodes that participate to
the routing of the message are alerted to stop communicating with any node in that list.
• Unlike previous works, the merit of CBDS lies in the fact that it integrates the proactive and
reactive defense architectures to achieve the aforementioned goal.
Advantages
• Decrease the energy consumption
• Decrease the time delay
• Increase the throughput
• Reduce the routing overhead
www.iistechnologies.in
Ph: 9952077540
Flow Diagram
www.iistechnologies.in
Ph: 9952077540
Bait Detection
Scheme
Send Bait
location
Send RREQ to one
hop neighbor node
Detect black
hole attacker
Use reverse
tracing
technique
Update neighbor
list
Send Packet through the
best path to Sink
Receive RREP
Conclusion
www.iistechnologies.in
Ph: 9952077540
• In this project, we have proposed a new mechanism (called the CBDS) for detecting malicious
nodes in MANET’s under gray/collaborative blackhole attacks.
• Our simulation results revealed that the CBDS outperforms the DSR, 2ACK, and BFTR schemes,
chosen as benchmark schemes, in terms of routing overhead and packet delivery ratio.
Future Work
www.iistechnologies.in
Ph: 9952077540
• Investigate the feasibility of adjusting our CBDS approach to address other types of collaborative
attacks on MANETs.
• Investigate the integration of the CBDS with other well-known message security schemes in order
to construct a comprehensive secure routing framework to protect MANETs against miscreants.
TOOLS AND SOFTWARE USED
Software
• Network simulator(NS2)
Language
• Object Oriented Tool Command Language(OTCL)
• C++
www.iistechnologies.in
Ph: 9952077540
References
• P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, “CBDS: A cooperative bait detection
scheme to prevent malicious node forMANET based on hybrid defense architecture,” in
Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp.
1–5.
• S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing
Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved
March 18, 2013).[ Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html
• C. Chang, Y.Wang, and H. Chao, “An efficientMesh-based core multicast routing protocol
onMANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229–239, Apr. 2007.
• D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile
Comput., pp. 153–181, 1996.
• I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone
protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp.
2727–2740.
www.iistechnologies.in
Ph: 9952077540
Services Offered
• Coding with Software’s
��� Documents
• Video File
• Skype classes(Online Support)
• Team viewer Support(Online Support)
• Future Enhancement
• Paper writing
• Support For Inter-National Conference paper publication.
www.iistechnologies.in
Ph: 9952077540
Contact
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in

More Related Content

Defending against collaborative attacks by malicious nodes in manets a cooperative bait detection approach

  • 1. DEFENDING AGAINST COLLABORATIVE ATTACKS BY MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT DETECTION APPROACH Presented by IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in Ph: 9952077540
  • 2. Abstract • In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. • In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. • This project attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. • Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance metrics). www.iistechnologies.in Ph: 9952077540
  • 3. Existing System • The lack of any infrastructure added with the dynamic topology feature of MANETs make these networks highly vulnerable to routing attacks such as blackhole and grayhole (known as variants of blackhole attacks). • In blackhole attacks, a node transmits a malicious broadcast informing that it has the shortest path to the destination, with the goal of intercepting messages. • In this case, a malicious node (so-called blackhole node) can attract all packets by using forged Route Reply (RREP) packet to falsely claim that “fake” shortest route to the destination and then discard these packets without forwarding them to the destination. • In grayhole attacks, the malicious node is not initially recognized as such since it turns malicious only at a later time, preventing a trust-based security solution from detecting its presence in the network. • It then selectively discards/forwards the data packets when packets go through it. www.iistechnologies.in Ph: 9952077540
  • 4. Disadvantages www.iistechnologies.in Ph: 9952077540 • Higher energy consumption • Routing overhead • Increase time delay
  • 5. Proposed System www.iistechnologies.in Ph: 9952077540 • In this project, proposes a cooperative bait detection scheme (CBDS) is presented that effectively detects the malicious nodes that attempt to launch grayhole/collaborative blackhole attacks. • In our scheme, the address of an adjacent node is used as bait destination address to bait malicious nodes to send a reply RREP message, and malicious nodes are detected using a reverse tracing technique. • Any detected malicious node is kept in a blackhole list so that all other nodes that participate to the routing of the message are alerted to stop communicating with any node in that list. • Unlike previous works, the merit of CBDS lies in the fact that it integrates the proactive and reactive defense architectures to achieve the aforementioned goal.
  • 6. Advantages • Decrease the energy consumption • Decrease the time delay • Increase the throughput • Reduce the routing overhead www.iistechnologies.in Ph: 9952077540
  • 7. Flow Diagram www.iistechnologies.in Ph: 9952077540 Bait Detection Scheme Send Bait location Send RREQ to one hop neighbor node Detect black hole attacker Use reverse tracing technique Update neighbor list Send Packet through the best path to Sink Receive RREP
  • 8. Conclusion www.iistechnologies.in Ph: 9952077540 • In this project, we have proposed a new mechanism (called the CBDS) for detecting malicious nodes in MANET’s under gray/collaborative blackhole attacks. • Our simulation results revealed that the CBDS outperforms the DSR, 2ACK, and BFTR schemes, chosen as benchmark schemes, in terms of routing overhead and packet delivery ratio.
  • 9. Future Work www.iistechnologies.in Ph: 9952077540 • Investigate the feasibility of adjusting our CBDS approach to address other types of collaborative attacks on MANETs. • Investigate the integration of the CBDS with other well-known message security schemes in order to construct a comprehensive secure routing framework to protect MANETs against miscreants.
  • 10. TOOLS AND SOFTWARE USED Software • Network simulator(NS2) Language • Object Oriented Tool Command Language(OTCL) • C++ www.iistechnologies.in Ph: 9952077540
  • 11. References • P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen, “CBDS: A cooperative bait detection scheme to prevent malicious node forMANET based on hybrid defense architecture,” in Proc. 2nd Intl. Conf. Wireless Commun., VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5. • S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, Jan. 1999. (Last retrieved March 18, 2013).[ Online]. Available: http://www.elook.org/computing/rfc/rfc2501.html • C. Chang, Y.Wang, and H. Chao, “An efficientMesh-based core multicast routing protocol onMANETs,” J. Internet Technol., vol. 8, no. 2, pp. 229–239, Apr. 2007. • D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Comput., pp. 153–181, 1996. • I. Rubin, A. Behzad, R. Zhang, H. Luo, and E. Caballero, “TBONE: A mobile-backbone protocol for ad hoc wireless networks,” in Proc. IEEE Aerosp. Conf., 2002, vol. 6, pp. 2727–2740. www.iistechnologies.in Ph: 9952077540
  • 12. Services Offered • Coding with Software’s • Documents • Video File • Skype classes(Online Support) • Team viewer Support(Online Support) • Future Enhancement • Paper writing • Support For Inter-National Conference paper publication. www.iistechnologies.in Ph: 9952077540
  • 13. Contact IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in