Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1444
Title: | DEFENDING AGAINST COLLABORATIVE ATTACKS BY MALICIOUS NODES IN MANETS: A COOPERATIVE BAIT DETECTION APPROACH |
Other Titles: | International Conference on Developing Advanced Research and Computer Technology |
Authors: | A, Kavitha |
Keywords: | collaborative bait detection blackhole attacks dynamic source routing grayhole attacks malicious node |
Issue Date: | 2019 |
Publisher: | KSG college of Arts and Science |
Abstract: | A Mobile Adhoc NETwork (MANET) is a type of ad hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks. However the flexibility of these characteristic creates the security threats. Security is an important issue for mobile ad hoc networks, due to the vulnerable nature of MANETs. This flexibility comes at a price and introduces new security threats. Furthermore, many conventional security solutions used for wired networks are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. To develop suitable security solutions for such new environments, must first understand how MANETs can be attacked. The nodes in the network can be easily affected by collaborative attacks such as blackhole attack, grayhole attack and jellyfish attacks. A cooperative bait detection approach is proposed against the collaborative attacks. The comparison was made between the different techniques that have been listed. The performance evaluation conducted was proved that the each and every method has unique advantage and disadvantages among each other. |
URI: | http://localhost:8080/xmlui/handle/123456789/1444 |
Appears in Collections: | International Conference |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
DEFENDING AGAINST COLLABORATIVE ATTACKS BY MALICIOUS NODES IN MANETS A COOPERATIVE BAIT DETECTION APPROACH.docx | 11.16 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.