Mobile ad hoc networks (MANETs) or wireless mesh networks (WMNs), experience serious security problems due to their particular characteristics as well as routing in a MANET is a particularly challenging task compared to a conventional. Wireless communication can endure interferences or malicious interceptions; whereas multi-hop communication assumes that each node will perform properly its functions to support network services. Further, self-organization increases the complexity of security management operations as access control, node authentication, secure routing and cryptographic key distribution. In MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. So, aims and objectives of this thesis work are to design and implement GA protocol with Black hole attack in OLSR protocol and prevent the system for threat using this hybridization. The whole simulation has been done in MATLAB 7.10.
Al Shurman, Mohammad, Seong-Moo Yoo, and Seungjin Park. \"Black hole attack in mobile ad hoc networks.\" Proceedings of the 42nd annual Southeast regional conference. ACM, 2004.
Anup Goyal and Chetan Kumar, “GA-NIDS: A Genetic Algorithm based Intrusion Detection System”, 2010.
Ahmed Sherif, Maha Elsabrouty. Amin Shoukry, “A Novel Taxonomy of Black-Hole Attack Detection Techniques in Mobile Ad-hoc Network (MANET)”, IEEE, pp: 346-352, 2013.
BinTian ; China Inf. Technol. Security Evaluation Center, Beijing, China ; Yizhan Yao ; LeiShi ; ShuaiShao in “ A Novel Sybil Attack Detection Scheme In Wsn”.
Crosbie, Mark, and Gene Spafford. 1995, “Applying Genetic Programming to Intrusion Detection” , InProceedings of 1995 AAAI Fall Symposium on Genetic Programming, pp. 1-8. Cambridge, Massachusetts, 1995.
C. Piro, C. Shields, and B. N. Levine, “Detecting the Sybil attack in mobile ad hoc networks,” in Proc. Securecomm Workshops, 2006, pp.1–11.
Dokurer, S.; Erten Y.M., Acar. C.E., SoutheastCon Journal, “Performance analysis of ad-hoc networks under black hole attacks”.Proceedings IEEE Volume, Issue, 22-25 March 2007 Page(s):148 –153.
D. B. Jagannadha Rao(et.al), “A Study on Dynamic Source Routing Protocol for Wireless Ad Hoc Networks” , International Journal of Advanced Research in Computer and Communication Engineering,Vol. 1, Issue 8, PP.522-529,October 2012
Dave, Dhaval, and Pranav Dave, \"An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET\", Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE, 2014.
Dokurer, S.; Erten Y.M., Acar. C.E., SoutheastCon Journal, “Performance analysis of ad-hoc networks under black hole attacks”.Proceedings IEEE Volume, Issue, 22-25 March 2007 Page(s):148 –153.
Hadlee, N.A.; Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India ; Kayalvizhi, S. in”Increasing Sybil attack detection probability in open acess distributed system”.
Harley Kozhushko, “Intrusion Detection: Host Based and Network-Based Intrusion Detection Systems”, Independent Study, 2003.
Istikmal ; Sch. of Eng., Telkom Univ., Bandung, Indonesia ; Leanna, V.Y. ; Rahmat, B.in “comparison of proactive and reactive protocol in manet”
James Newsome, Elaine Shi, Dawn Song and Adrian Perrig, “The Sybil Attack in Sensor Networks: Analysis and Defenses” IPSN‟04, April 26-27,2004, Berkeley, California, USA.
K.S. Sujatha, V. Dharmar. R.S. Bhuvaneswaran, “Design of genetic algorithm based IDS for MANET”, Conference: Recent Trends In Information Technology (ICRTIT), IEEE, pp.28-33, 2012.
Kaur, Harjeet, Manju Bala, and Varsha Sahni,\"Study of Blackhole Attack Using Different Routing Protocols in MANET\", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering2.7 (2013): 3031-3039.
MANET, DSR, Genetic algorithm, routing, OLSR.