DOI: 10.23883/IJRTER.2017.3182.NEASU 530
COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING
COLLABORATIVE ATTACKS IN MANETS
Ms. Meghana M1, Mrs. Shraddha C
2
1M.Tech, Department of Computer Science and Engineering, VidyaVardhaka College Of Engineering,
Mysuru, India 2Assistant Professor,Department of Computer Science and Engineering, VidyaVardhaka College Of
Engineering, Mysuru, India
Abstract -The most required technology which is still an interesting topic for researchers are the
Mobile Adhoc Networks. It provides various flexible characteristics which are useful at many
situations but launch few threats related to security. These threats are the collaborative attacks such
as black hole and gray hole attacks. These severe attacks which are responsible for dropping the
packets during transmission can be overcome in this paper using a secure mechanism called the
Combined bait discovery method(CBDM).This method includes dynamic route discovery scheme
and selective repeat protocol for defending the attacks. Node ranking algorithm is used to identify the
true malignant nodes and by adopting this algorithm the resource consumption can be reduced.
Keywords: Combined Bait Discovery Method (CBDM), Gray hole attack, Black hole attack, Node
ranking algorithm.
I. INTRODUCTION
A MANET is a network which configures itself and nodes are connected wireless. Node in the
network or device can often move freely in any direction. There is no proper structure for adhoc
systems. Routes are discovered by broadcasting the request to all the nodes and receiving respective
acknowledgements in the system. If the nodes are beyond the transmission range, multi-hop is
adopted. There is no central administration in the network.
Fig.1. Mobile Adhoc Network
Due to the flexibility of the nodes in the network, there can exist many security threats. It can be gray
hole attacks, Black hole attacks, Jelly fish attacks, etc. In this paper, the gray hole and black hole
attacks can be overcome by a method called Combined Bait Discovery Method (CBDM).The black
hole attacks are always caused at the same instance of time, when each time a route is generated.
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 04; April - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 531
Fig.2. Black hole attack
While the gray hole attacks are caused at selective time i.e... Packets can be dropped at any time
during the data transmission.
Fig.3. Gray hole attack
II. RELATED WORK The security issues of MANET still exist. MANET is used to find just single malicious node in the
network. Few changes are required in the existing system being used [1] [7].The problem of
augmentation in the route overhead exists in the receptive steering convention [12].In 2ACK scheme,
the affirming packet must also be sent with the information.
Therefore, this creates overhead [10].
“Defending against collaborative packet drop attacks on MANETs” [13], has provided a hashing
function in the system. The delivery ratio starts the detection of black hole.
The paper “Prevention of cooperative black hole attack in MANETs” [3], give the approach in which
the cooperative black hole attack is found which recognizes the malicious node. AODV MANET
routing protocol provides a method which depends on intruders from local nodes instead of source
node [11].
III. PROPOSED APPROACH The Combined Bait Discovery Method (CBDM) provides a unique approach to prevent the
malicious nodes from causing the severe attacks like black hole and gray hole attacks. It uses the
DSR and Selective repeat protocol.
The CBDM operates in four steps:-
A. Early/Intense defense mechanism
-Initial Trap step
-Reverse tracking step
B. Route discovery
C. Data transmission
D. Perceptive defense mechanism
International Journal of Recent Trends in Engineering & Rese
A.Early/Intense Defense mechanism The one hop neighbors are identified and the initial trap step is initiated where malicious node also
enters into the path. For fake RREP, Reverse tracking step is initiated, where the sour
‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by
verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.
The following figure shows how to trace or id
In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,
node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance
that m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1
of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation
between the address that records the
W and U is,
m2 and m1 would perform the same operation which is subsequent to accepting the RREP.
B. Route discovery Using the Dynamic Source Routing (DSR), the optimal route or path between any source and
destination is found by avoiding malicious IPs.
C. Data Transmission The selective repeat protocol uses end to end acknowledgement scheme in transmission of data
between nodes. For packet retransmission, it uses time out timers.
D. Perceptive defense mechanism The delivery ratio for the currently used optimal
certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It
initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the
malicious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,
International Journal of Recent Trends in Engineering & ReseVolume 03, Issue 04; April - 2017
A.Early/Intense Defense mechanism The one hop neighbors are identified and the initial trap step is initiated where malicious node also
enters into the path. For fake RREP, Reverse tracking step is initiated, where the sour
‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by
verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.
The following figure shows how to trace or identify the malicious node-
Fig.4. Reverse Tracking
In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,
node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance
m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1
of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation
between the address that records the
T=W-U= {m4, m5, m6}
m2 and m1 would perform the same operation which is subsequent to accepting the RREP.
Using the Dynamic Source Routing (DSR), the optimal route or path between any source and
destination is found by avoiding malicious IPs.
The selective repeat protocol uses end to end acknowledgement scheme in transmission of data
between nodes. For packet retransmission, it uses time out timers.
Perceptive defense mechanism The delivery ratio for the currently used optimal route during data transmission is calculated. It uses
certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It
initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the
ious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,
International Journal of Recent Trends in Engineering & Research (IJRTER) 2017 [ISSN: 2455-1457]
The one hop neighbors are identified and the initial trap step is initiated where malicious node also
enters into the path. For fake RREP, Reverse tracking step is initiated, where the source node sends a
‘recheck’ packet to inform each node to enter into promiscuous mode to validate neighbors by
verifying packet signatures and identify fake node. Black hole attack is detected in this mechanism.
In Fig.4, a malignant node m4 exist in the path or route. After the source node m1 sends the RREQ,
node m4 sends a false RREP along the address list W= {m1, m2, m3, m4, m5, m6}. On the chance
m3 had got the answered RREP by m4,it would isolate the W list by the destination address m1
of the RREP in the field and get the address list U={m1,m2,m3}.The set distinction operation
m2 and m1 would perform the same operation which is subsequent to accepting the RREP.
Using the Dynamic Source Routing (DSR), the optimal route or path between any source and
The selective repeat protocol uses end to end acknowledgement scheme in transmission of data
route during data transmission is calculated. It uses
certain threshold in terms of percentage to check if the delivery ratio drops below the parameter. It
initiates the reactive step by new bait packet, verifies RREPs and finds malicious IPs. If the
ious node is found, then a secondary optimal path is chosen for transmission. Gray hole attacks,
International Journal of Recent Trends in Engineering & Rese
which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is
adopted.
During each optimal route chosen, a delivery ra
the delivery ratio, the source node categorizes the nodes based upon the node categorization
algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for
sure. Once the malicious node or path is identified, then the nodes are ranked again along the
immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is
transmitted safely. This algorithm in turn reduces the resource con
The following figure (Fig.5) shows the procedure of CBDM method.
Fig.5. Procedure of CBDM scheme
International Journal of Recent Trends in Engineering & ReseVolume 03, Issue 04; April - 2017
which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is
During each optimal route chosen, a delivery ratio is calculated for each node in the route. Based on
the delivery ratio, the source node categorizes the nodes based upon the node categorization
algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for
nce the malicious node or path is identified, then the nodes are ranked again along the
immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is
transmitted safely. This algorithm in turn reduces the resource consumption.
The following figure (Fig.5) shows the procedure of CBDM method.
Fig.5. Procedure of CBDM scheme
International Journal of Recent Trends in Engineering & Research (IJRTER) 2017 [ISSN: 2455-1457]
which are difficult to find out, are prevented here. In preventing this, a node ranking algorithm is
tio is calculated for each node in the route. Based on
the delivery ratio, the source node categorizes the nodes based upon the node categorization
algorithm (node ranking algorithm).This algorithm identifies the packet dropper (malicious node) for
nce the malicious node or path is identified, then the nodes are ranked again along the
immediate optimal path or route. Behavior of the nodes in the route are kept track until the data is
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 04; April - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 534
IV. CONCLUSION
Majority of the researchers have discovered various ways to deal with malicious node. The
enhancement of this approach is to prevent the black hole and gray hole attacks. It prevents the loss
of packets during the data transmission .The proposed scheme has been implemented practically or
in real time instead of using simulator to find results. This scheme increases the versatility to detect
and prevent two types of attacks i.e... Black hole and gray hole attacks. The intense and perceptive
defense mechanisms increase the efficiency of the detection and the resource consumption is avoided
by the use of node ranking/categorization algorithm.
V. FUTURE WORK
The future work in the scheme is expected to differentiate the achievability of modifying the CBDM
scheme to deal with the identity and change the assaults on MANETs.
REFERENCES [1] “Modified Cooperative bait detection approach for defending Collaborative attacks in MANETs”,
Emimajuliet.P, Thirilogasundari.V, International Conference On Information Communication And Embedded
System(ICICES 2016).
[2] “Defending against collaborative attacks by malicious nodes in MANETS: A cooperative Bait detection
approach”, Jianming chang, PO- chun Tsou, Isac Wangang, Hancheihchao, Chin-fenglai, Member IEEE, 2015.
[3] “Detecting and preventing black hole attacks in MANETs using CBDS (Cooperative Bait Detection Scheme)” ,
A.Agalya,C. Nandini, S. Sridevi, International Journal of Modern Trends in Engineering and Research (IJMTER),
Volume 02, Issue 04, 2015.
[4] “Towards Security against Malicious Node Attack in Mobile Ad Hoc Network”, Ramandeep Kaur , Jaswinder
Singh, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7,
July 2013.
[5] “Combating Resource Consumption and Byzantine Attacks in MANET through Enhanced CBDS Technique”,
Muskan Sharma, Chander Prabha ,” American International Journal of Research in Science, Technology, Engineering &
Mathematics AIJRSTEM 14-543,2014.
[6] “Detection and Recovery of Packet Drop under Network Layer Attack in MANET”, C. Deepika Shiny , I.
Muthumani, International Conference on Electrical, Information and Communication Technology, 28 February 2015.
[7] “CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense
architecture,” in Proc. 2nd Intl. Conf. Wireless Commun.,VITAE, Chenai, India, Feb. 28–Mar., 03, 2011, pp. 1–5. P.-C.
Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen.
[8] “TBONE: A mobile-backbone protocol for adhoc wireless networks”, I. Rubin, A. Behzad, R. Zhang, H. Luo,
and E.Caballero, in Proc. IEEE Aerosp. Conf., 2002,vol. 6, pp.
2727–2740.
[9] “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and
evaluation”, H. Weerasinghe and H. Fu, in Proc. IEEE ICC, 2007, pp. 362– 367.
[10] “Cooperative Bait Detection Scheme (CBDS) To Avoid the Collaborative Attacks of Nodes in MANET”,
AkinlemimOlushola O., K. Suresh Babu , Volume 3 Issue 4, April 2014.
[11] “Security Routing Mechanism for Black Hole Attack over AODV MANET Routing Protocol”, Maha Abdelhaq,
Sami Serhan, Raed Alsaqour and Anton Satria Australian Journal of Basic and Applied Sciences, 5(10): 1137-1145.
[12] “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks”, K. Vishnu and A. J
Paul, Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.
[13] “Defending against Collaborative Packet Drop Attacks on MANETs”, W.Wang, B.Bhargava, and M.
Linderman, 28th International Symposium on Reliable Distributed Systems September 2009.