Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
Abstract:
Proactive Protocol
Reactive protocol
Hybrid protocol
3. VULNERABILITIES ON ROUTING
PROTOCOL
Presently there are a wide variety of routing protocols, but
these protocols are not secured and face many attacks
[13,14], which gives rise to the vulnerability in the
network and might highly affect the efficiency of the
system. In mobile ad-hoc network any node can affect by
the different type of attacks. Mainly in MANET there are
two type of attack 1) Data traffic attack. 2) Control traffic
attack. In data traffic attack data packets are affected like,
Black hole attack, Cooperative Black hole attack, Greyhole attack, Jellyfish attack etc. In control traffic attack
control packets are affected, like Worm-hole attack, Hello
flood attack, Bogus registration attack, Rushing attack,
Sybil attack and Blackmail attack etc.
3.1 Data Traffic Attack:
3.1.1 Black hole attack:
In this attack a malicious node acts like a Black hole, [15]
5. CONCLUSION
From extensive studies on existing secure MANET
routing protocols, it has been observed that these protocols
do not adequately mitigate attacks by misbehaving nodes
which not only modify packets but also selectively drop
some or all the packets. These misbehaving nodes cause
various network communication problems. These studies
have finally motivated us to search for an alternative
design towards more efficient, secure routing protocols for
MANET to be used in adversarial environment.
REFERENCES
[1] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields. A
Secure Routing Protocol for Ad Hoc Networks in
proc. of Network Protocols, 2002. Proceedings. 10th
IEEE International Conference, November -2002,
pp.78-87.
[2] H. N. Saha, A. Chattopadhyay and D. Sarkar
Review on intelligent routing in MANET, in proc.
of 6th International Conference and Workshop on
Computing and Communication (IEMCON -2015),
IEEE Xplore Digital Library, October 2015 , pp. 1-6.
[3] S. Banerjee, R. Nandi, R. Dey and H. N. Saha, A
review on different Intrusion Detection Systems for
MANET and its vulnerabilities, in proc. of 6th
International Conference and Workshop on
Computing and Communication (IEMCON -2015),
IEEE Xplore Digital Library, October 2015 , pp. 1-7.
[4] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B.
Banerjee, S. Mukherjee, R. Singh and D. Ghosh, A
Review on MANET Routing Protocols and its
Vulnerabilities, International Journal of Emerging
Trends & Technology in Computer Science
(IJETTCS),vol. 2, no. 6, pp. 252-262,November 2013.
[5] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B.
Banerjee, S. Mukherjee, R. Singh and D. Ghosh, A
Review on Attacks and Secure Routing Protocols in
Manet, International Journal of Innovative Research
and Review (JIRR) ,vol.1, no. 2, pp.12-36,December
2013.
[6] J. Mandaland H. N. Saha, Modified Ant Colony
Based Routing Algorithm in MANET, International
Journal of Computer & Organization trends
(IJCOT),vol..3, no.10, pp.473-477,November2013.
[7] S. K. Deb,H. N. Saha, D. Bhattacharyya and P. K.
Banerjee, Modified Dynamic On-Demand Routing
Protocol, International Journal of Emerging Trends
and Technology in Computer Science (IJETTCS),
vol. 3,no. 2, pp.139-144, March 2014.
[8] W. Sarkar, H. N. Saha and A. Ghosh, A Greedy
Methodology to Solve Travelling Salesperson
Problem Using Ant Colony Optimization
International Journal of Science and Research (IJSR),
Vol. 3 No. 7, July 2014.
AUTHOR
He completed B-Tech from West Bengal University
of Technology, India on Computer Science
Engineering and Technology from CSET and
completed M.Tech form West Bengal University of
Technology,
India
on Computer
Science
Engineering and Technology from Institute of Engg & Tech,
Kolkata. His area of interests is Wireless sensor networks, Data
Mining, Image Processing.
Himadri Nath Saha has completed his Bachelor
of Engineering from Jadavpur University and has
received his Master of Engineering from Indian
Institute of Engineering, Science and Technology.
After completing his Master of Business
Administration he has completed his PhD in Engineering from
Jadavpur University.
Page 79