2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications 2007
DOI: 10.1109/ictmicc.2007.4448606
|View full text |Cite
|
Sign up to set email alerts
|

A distributed protocol for detection of packet dropping attack in mobile ad hoc networks

Abstract: In multi-hop mobile ad hoc networks (MANETs), mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a mali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…Zeshan et al [2] proposed a twofold solution to detect and identify malicious nodes in network by setting Tmax (maximum threshold) and monitoring nodes to declare misbehaving nodes. Sen et al [3] proposed a cooperative scheme used to detect malicious node, as every node in network monitors the behavior of its neighbors upon abnormal action. Distributed algorithm is used to confirm attack in network.…”
Section: Related Workmentioning
confidence: 99%
“…Zeshan et al [2] proposed a twofold solution to detect and identify malicious nodes in network by setting Tmax (maximum threshold) and monitoring nodes to declare misbehaving nodes. Sen et al [3] proposed a cooperative scheme used to detect malicious node, as every node in network monitors the behavior of its neighbors upon abnormal action. Distributed algorithm is used to confirm attack in network.…”
Section: Related Workmentioning
confidence: 99%
“…For example in [28], the authors propose a protection scheme against a data packet dropping attack based on the cooperative participation of nodes. This scheme requires every node in the network to monitor the behaviour of its neighbours; when it detects packet dropping it invokes a distributed approach to investigate the attack.…”
Section: A Protecting Against Data Packet Droppingmentioning
confidence: 99%
“…Since, the values of F A , r 2 and x are all known to node A, it can compute the value of r 1 using (13). Once the values of r 1 and r 2 are computed by node A, it can compute the value of (a + b + c) using (6).…”
Section: A Modified Cpda For Enhanced Energy Efficiencymentioning
confidence: 99%
“…An aggregation tree is constructed that monitors the activities of the aggregator nodes. The child nodes of an aggregator monitor the incoming data to the aggregator using the neighborhood watch mechanism [13], and invoke a voting protocol if any suspicious activity by the aggregator node is observed.…”
Section: Related Workmentioning
confidence: 99%