0% found this document useful (0 votes)
20 views6 pages

22csb0a36 Mannet

The document discusses a method to prevent packet dropping attacks in AODV-based routing within Mobile Ad-hoc Networks (MANETs), highlighting the vulnerabilities of decentralized networks. It proposes a system that identifies and monitors nodes, detects malicious behavior, and redistributes bandwidth to ensure network reliability and efficiency. Real-world applications include military communication, disaster response, and smart city infrastructures, while challenges such as computational overhead and false positives are acknowledged.

Uploaded by

agnesteresa001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views6 pages

22csb0a36 Mannet

The document discusses a method to prevent packet dropping attacks in AODV-based routing within Mobile Ad-hoc Networks (MANETs), highlighting the vulnerabilities of decentralized networks. It proposes a system that identifies and monitors nodes, detects malicious behavior, and redistributes bandwidth to ensure network reliability and efficiency. Real-world applications include military communication, disaster response, and smart city infrastructures, while challenges such as computational overhead and false positives are acknowledged.

Uploaded by

agnesteresa001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Preventing Packet Dropping Attack on AODV-

Based Routing in MANET

Done by:

Agnes Teresa Davuri

22CSB0A36, B. Tech 3rd year(CSE), NIT, Warangal


• Preventing Packet
Dropping Attack on AODV-
Based Routing in MANET
• Authors: Neema Soliyal &
Dr. H.S. Bhadauria
• Contents: Introduction

• • What is MANET? – A Mobile Ad-hoc Network (MANET) is a


decentralized, self-configuring wireless network where nodes
communicate without fixed infrastructure.
• Why is Routing Important? – Since nodes are mobile,
efficient routing protocols are required to ensure reliable data
transmission.
• AODV Protocol – Ad-hoc On-demand Distance Vector (AODV)
is a popular routing protocol that establishes routes only when
needed, reducing overhead.
• Challenges in MANET – Due to dynamic topology and lack of
centralized security, MANETs are vulnerable to various attacks.
• Security Threats – Packet dropping attacks, bandwidth
exhaustion, and malicious node behaviors significantly degrade
network performance.
• Need for a Solution – Identifying and mitigating packet
dropping attacks is crucial for improving network reliability and
efficiency.
Content: Problem Statement and key idea

Problem Statement: Key Idea:

• Vulnerability in MANETs: Mobile Ad-hoc Networks (MANETs) • Node Identification & Monitoring: Each node is assigned a
operate in a decentralized manner, making them highly unique identifier, and its behavior is monitored during data
susceptible to security threats. transmission.
• Packet Dropping Attack: Malicious nodes intentionally drop • Packet Forwarding Analysis: The system counts the number
packets instead of forwarding them, leading to a decrease in of packets forwarded and dropped by each node.
packet delivery ratio (PDR).

• Bandwidth Attack (DDoS): Attacker nodes flood the network • Threshold-Based Attack Detection:
with excessive traffic, consuming bandwidth and causing delays • If a node drops packets beyond a certain threshold, it is
or network failures. classified as a malicious node.
• If a node requests excessive bandwidth, it may be a
• Challenges in Detection: bandwidth attacker.
• Malicious nodes disguise themselves as legitimate nodes. • Node Bypassing Technique:
• High mobility of nodes makes attack detection complex. • Malicious nodes are bypassed during route discovery to
• Traditional security mechanisms are difficult to implement prevent them from affecting communication.
due to resource constraints.
• Impact on Network Performance: Alternative safe routes are chosen dynamically.
• Increased packet loss leads to poor Quality of Service (QoS). • Bandwidth Redistribution: The network reallocates
• Reduced throughput and network congestion. bandwidth resources to prevent attackers from consuming
• Increased energy consumption due to retransmissions. excessive bandwidth.
• Objective of the Research: To develop a technique that • Enhancing Security Without Overhead: The proposed
efficiently detects and mitigates packet solution does not require complex cryptographic security
mechanisms, making it lightweight and efficient for real-time
scenarios.
Contents: Architecture
and Flow charts
• Flowchart:

Architecture:
• The network ensures only trusted nodes
participate in routing.

• Attacker nodes (packet droppers and


excessive BW users) are bypassed.

• Bandwidth is fairly redistributed among


normal nodes.

• The system enhances security, network


efficiency, and overall reliability.

Key Takeaways

✅ Identifies and isolates packet dropping


nodes.
✅ Detects bandwidth misuse and prevents
network congestion.
✅ Ensures fair bandwidth allocation to
genuine nodes.
✅ Reduces routing overhead and improves
network performance.
Content: Mathematical Model
1. Network Representation
• Let N be the set of nodes in the MANET: N={n1,n2,n3,...,nk} Each node ni has:
• Bandwidth (Bw(ni)) assigned to it.
• Packet forwarding count (Pf(ni)) to track packets sent.

2. Packet Dropping Attack Detection


• Define D(ni) as the number of dropped packets.

• If a node drops packets beyond a threshold (T): D(ni)/Pf(ni)>T⇒ni is an attacker

• Action: Malicious nodes are bypassed, and alternate routes are used.

3. Bandwidth Consumption Attack Detection


• If a node ni requests more bandwidth than a threshold α × Bw(ni): R(ni)>α×Bw(ni)⇒ni is an attacker

• Action:
• Restore bandwidth levels.
• Bypass attacker nodes.
• Redistribute bandwidth fairly.
Title: Real World Applications, Challenges and Future scope
Real-World Applications:

• Defense and Military Networks – Ensures secure battlefield communication and prevents malicious packet drops.

• Disaster Response Networks – Provides reliable communication for rescue teams during natural disasters.

• Vehicular Ad-hoc Networks (VANETs) – Secures vehicle-to-vehicle communication, preventing traffic congestion and
accidents.

• Healthcare and Telemedicine – Supports real-time patient monitoring and secure data transmission for remote
surgeries.

• Smart Cities and IoT Networks – Protects sensor-based infrastructures like smart grids, traffic systems, and
surveillance networks.

• Underwater Sensor Networks – Used in marine exploration and environmental monitoring to prevent data loss in
challenging conditions.

Challenges:

• High computational overhead.

• False positive detection of malicious nodes.

Future Scope:

• Integrating AI-based threat detection.

You might also like