Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Rakesh Kumar ER

Volume 02 Issue 02  Year 2015 

ISSN no: 2348-3121  

Page no: 1-6

Abstract— In Mobile Ad hoc Networks (MANET), malicious node detection and secure route discovery is one of the key issues for the establishment of secure communication among nodes. In this paper, we have proposed a secure route discovery protocol with Bait detection setup for MANET. Secure route is discovered by generating secure key and using Shamir’s secret sharing technique.

Keywords— Malicious Node, Key Issues, Secure Route, Bait, MANET


[1]. Meenakshi Patel and Sanjay Sharma, “Detection of Malicious Attack in MANET A Behavioral Approach”, IEEE 3rd International Advance Computing Conference (IACC), pp. 388 – 393,(2012).
[2]. ReshmaLill Mathew, P. Petchimuthu, “Detecting Selfish Nodes in MANETs Using Collaborative Watchdogs”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, Issue 3, ISSN: 2277 128X, March 2013.
[3]. Umesh Kumar Singh, KailashPhuleria,Shailja Sharma and D.N. Goswami, “An analysis of Security Attacks found in Mobile Ad-hoc Network”, International Journal of Scientific & Engineering Research, Vol. 5, Issue 5, ISSN 2229-5518, (May-2014).
[4]. Tao Gong and Bharat Bhargava, “Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model”, Security and Communication Networks, Vol. 6, Issue 1, pp. 58–68, January (2013).
[5]. Ajay Dureja and VandnaDahiya, “Performance Evaluation of Collaborative Attacks in Manet”, A Monthly Journal of Computer Science and Information Technology (IJCSMC), Vol. 3, Issue. 7, pp. 457 – 465, ISSN 2320–088X, July (2014).
[6]. Cong Hoan Vu and AdeyinkaSoneye, “An Analysis of Collaborative Attacks on Mobile Ad hoc networks”, LAP LAMBERT Academic Publishing, June (2009).
[7]. Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika, “Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks ”, 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447 – 450, ISSN :1545-0678, (2009).
[8]. Mahdi Nouri, SomayehAbazariAghdam and SajjadAbazariAghdam, “Collaborative Techniques for Detecting Wormhole Attack in MANETs”, International Conference onResearch and Innovation in Information Systems (ICRIIS), pp. 1- 6, (2011).
[9]. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, HanChieh Chao, and Chin-Feng Lai, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach”, IEEE SYSTEMS JOURNAL, Vol. PP, Issue: 99, ISSN: 1932-8184, pp. 1 – 11,(2014).
[10]. JaydipSen, M. Girish Chandra, P. Balamuralidhar, Harihara and S.G., Harish Reddy, “A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks”, IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, pp. 75 – 80, (2007).
[11]. Chang Wu Yu, Tung-Kuang Wu, ReiHeng Cheng and Shun Chao Chang, “ A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, Emerging Technologies in Knowledge Discovery and Data Mining Lecture Notes in Computer Science,Vol. 4819,pp. 538-549, (2007).
[12]. Weichao Wang, Bharat Bhargava and Mark Linderman, “Defending against Collaborative Packet Drop Attacks on MANETs”, 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS), Vol. 27, (2009).
[13]. Sukla Banerjee, “Detection / Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, In proceedings of the world congress on engineering and computer science (WCECS), pp. 22-24,(2008).
[14]. Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, and Peter Mason, “Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning” , IEEE Transactions on Vehicular Technology, (2014), 10.1109/TVT.2014.2313865.
[15]. Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi,” Enhanced Backtracking Chord Protocol for Mobile Ad hoc Networks”, IEEE Second International Conference on Communications and Information Technology,(2012).
[16]. Ditipriya SINHA, Uma BHATTACHARYA, Rituparna CHAKI, ”RSRP: A Robust Secure Routing Protocol in MANET”, F O U N D A T I O N S O F C O M P U T I N G A N D D E C I S I O N S C I E N C E S, Vol. 39 (2014) DOI: 10.2478/fcds-2014-0008
[17]. https://www.eecis.udel.edu/~mills/time.html.
[18]. Network Simulator: http:///www.isi.edu/nsnam/ns

Full Paper: Click Here