Remapping Attack Detection and Prevention for Reliable Data Service in MANET

  • Aradhana SaxenaEmail author
  • Manish Khule
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)


Mobile ad hoc Network is a promising technology in recent years. The number of nodes are forming dynamic link in between sender and receiver. The Mobile ad hoc Network (MANET) are operating in absence of centralized administration and because of that attackers are simply changed or acting malicious activities in network. One in all the most important challenge in wireless mobile ad hoc sensor networks nowadays is protection. In this title we tend to plan a completely unique security scheme for Remapping Attack. This type of attacks is amendment the priority of communication and acting misbehavior through flooding of huge quantity of reserve packets in communication network. The attacker node is provides the primary priority itself for information sending and remainder of the nodes priority is come back when attacker. The proposed results of assaulter malicious activities are consumed link bandwidth and additionally actual data delivery in network is affected. The aim of this research is to measure the malicious performance of Remapping attack in MANET and identifies the node/s that are affected the routing performance. The proposed security theme are check the priority order of each sender node in network that require to communicate and solely the offender is one altogether the node that flooded the reserve packets in network and in addition the assaulter node is not the sender or receiver. The proposed security scheme against remapping are block the activity of offender. The performance of network is measured on the basis of performance metrics like as network throughput, PDF and routing overhead, attacker node identification.


MANET Security Remapping attack Flooding Routing 


  1. 1.
    Konorski, J., Szott, S.: Discouraging traffic remapping attacks in local ad hoc networks. IEEE Trans. Wirel. Commun. 13(7), 3752–3767 (2014)CrossRefGoogle Scholar
  2. 2.
    Chlamtac, I., Conti, M., Liu, J.J.-N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)CrossRefGoogle Scholar
  3. 3.
    Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31. ACM, 2016Google Scholar
  4. 4.
    Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks, Wirel./Mob. Netw. Secur. 103–135 (2006)Google Scholar
  5. 5.
    Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different types of attacks on integrated MANET-internet communication. Int. J. Comput. Sci. Secur. (IJCSS) 4(3), 265–274 (2010)Google Scholar
  6. 6.
    Manikandan, K.P., Satyaprasad, R., Rajasekhararao, K.: A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks. Int. J. Adv. Comput. Sci. Appl. 2(3), 7–12 (2011)Google Scholar
  7. 7.
    Saha, H.N., Bhattacharyya, D., Pk, Banerjee: Study of different attacks in MANET with its detection & mitigation schemes. Int. J. Adv. Eng. Technol. IJAET 3(1), 383–388 (2012)Google Scholar
  8. 8.
    Jain, S.: Security threats in MANETS: a review. Int. J. Inf. Theor. (IJIT) 3(2) (2014)Google Scholar
  9. 9.
    Tayal, S., Gupta, V.: A survey of attacks on MANET routing protocols. Int. J. Innov. Res. Sci. Eng. Technol. 2(6), 2280–2285 (2013)Google Scholar
  10. 10.
    Sulthana, S.R., Reddy, D.S.C., Manohar, T.B.: An efficient mechanism of handling MANET routing attacks using risk aware mitigation with distributed node control. Int. J. Mod. Eng. Res. (IJMER) 3(5), 2996–3004 (2013)Google Scholar
  11. 11.
    Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Netw. 55, 3441–3457 (2011)CrossRefGoogle Scholar
  12. 12.
    Gagandeep, A., Kumar, P.: Analysis of different security attacks in MANETs on protocol stack a-review. Int. J. Eng. Adv. Technol. (IJEAT) 1(5) (2012). ISSN: 2249-8958Google Scholar
  13. 13.
    Narang, E.K.: A study of different attacks in MANET and discussion about solutions of black hole attack on AODY protocol. Int. J. Adv. Res. Comput. Eng. Technol. 2(4), 1601–1606 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Computer Science and EngineeringGwalior Institute of Technology and ScienceGwaliorIndia

Personalised recommendations