In MANET many vulnerable attacks like passive and active are possible, by which performance of the network goes slow
down. Among all the attacks discussed in literature selective packet drop attack is the most common active type of attacks. Selective packet
Drop attack is the partial denial of service attacks which is triggered by the malicious nodes in the network. In the previous research, many
techniques have been proposed to isolate Selective attacks from the network. When Selective packet attack is triggered in the network,
throughput of the network reduced and delay increase as steady rate. In my research, I will use more optimized technique to improve the
performance of the network by isolating the selective packet drop attack in AODV Protocol.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 395-399
Figures :05
Tables : 01
Sandeep Singh : Research Scholar, Guru Kashi University
Talwandi Sabo (151001).
Dr. Rajinder Singh : Asst . Prof., University College of Computer Applications
Guru Kashi University, Talwandi Sabo (151001).
Manet, AODV, DSR, DSDV
Mobile ad-hoc network have been wast area of research
work from past few years because its widely used
application in battlefield and business purpose. Due to
openness and dynamic topology network is vulnerable
from attacker. This research discussed MANET, its attack
which trigger on it and various techniques to isolate and
prevent selective packet drop attack which degrade the
system performance by decreasing throughput, increasing
latency and end-to-end delay. There is acknowledgement
and IDS based schema which prevent this attack in AODV
protocol. This feature work implemented new algorithm
based on monitor node technique which improves network
efficiency.
[1] Chuachan T., Puangpronpitag S., “A Novel Challenge
& Response Scheme against Selective Forwarding
Attacks in MANETs”, 2013 IEEE
[2] Patel C.V., Joshi A.H., Shah B.D., Patel C., “Security
Attacks On MANET Routing Protocols“ ,International
Journal of Computer Trends and Technology (IJCTT),
Volume 4, Issue 10, Oct. 2013
[3] Garg V., Shukla M.K., Choudhury T., Gupta C.,
“Advance Survey of Mobile Ad-Hoc Network,” IJCST
Vol. 2, Issue 4, Oct. - Dec. 2011
[4] Bhalaji N., Shanmugan A., “Reliable Routing against
Selective Packet Drop Attack in DSR based MANET”,
JOURNAL OF SOFTWARE, Volume 4, No.6, Aug.
2009
[5] kyasanur P., Vaidya N.H., “Selfish MAC layer
Misbehavior in wireless networks”, IEEE on Mobile
Computing ,2005
[6] Goyal P., Parmar V., Rishi R.,“MANET:
Vulnerabilities, Challenges, Attacks, Application” ,
IJCEM International Journal of Computational
Engineering & Management, Volume 11, Jan. 2011
ISSN (Online): 2230-7893, 2011.
[7] Nandy R., Roy D.B., “Study of Various Attacks in
MANET and Elaborative Discussion Of Rushing
Attack on DSR with clustering scheme” Int. J.
Advanced Networking and Applications” Volume 03,
Issue 01, Pages 1035-1043, 2011
[8] Bhatia A.S., Cheema R.K.,“Analysing and
Implementing the Mobility over MANETS using
Random Way Point Model”, International Journal of
Computer Applications (0975 – 8887) Volume 68,
No.17, Apr. 2013 .
[9] G. Vigna, S Gwalani “An Intrusion Detection Tool for
AODV-based Ad hoc Wireless Networks”.
[10] Sevil Sen, John A. Clark, Juan E. Tapiador “Security
Threats in Mobile Ad Hoc Networks”.