Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 18
Year of Publication: 2015
J. Deepa
K. Hemapriya
S. Kaviarasan

J.deepa, K.hemapriya and S.kaviarasan. Article: Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes. International Journal of Computer Applications 113(18):30-33, March 2015. Full text available. BibTeX

	author = {J.deepa and K.hemapriya and S.kaviarasan},
	title = {Article: Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {18},
	pages = {30-33},
	month = {March},
	note = {Full text available}


In this paper, we consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node in MANET is able to successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. Here the problem is to identify malicious nodes that launch a pollution attack using SIEVE a decentralized, accurate and robust technique that exploits rateless codes which detect chunk integrity. Source nodes transmit data using Luby Transform codes (a class of rateless codes) and any legitimate node in a WMN executes a randomized and fully distributed detection mechanism to detect its malicious neighbors and it is isolated subsequently. Furthermore, an interesting trade-off between coding efficiency and SIEVE completeness, reactivity and accuracy is discovered. We also show that SIEVE is efficient that requires low memory, computational and communication resources.


  • M. Luby, "LT codes," in Proc. 43rd FOCS, Washington, DC, USA, 2002, pp. 271–280.
  • Jing Dong, Reza Curtmola and Cristina Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-FlowNetwork Coding for Wireless Mesh Networks," in Proc. ACM Conference on Security in Wireless Mobile Network, Mar. 2009.
  • ShwetaAgrawal and Dan Boneh, "Homomorphic MACs: MAC- based Integrity for Network Coding," in 7th International Conference on Applied Cryptography and Network Security, June 2009.
  • A. Rajaram and Dr. S. Palaniswami, "A Trust-Based Cross-Layer Security Protocol for Mobile Ad hoc Networks," in International Journal of Computer Science and Information Security,Vol. 6, No. 1, October 2009.
  • Xing Jin and S. H. Garychan, "Detecting Malicious Nodes in Peer-to Peer Streaming by Peer Based Monitoring," in ACM Transactions on Multimedia Computing, Communication& Applications, Vol: 6, Issue:2, March 2010.
  • Qiyan Wang, Long Vu Klara Nahrstedt and Himanshu Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in In Proc. IEEE INFOCOM, August 2010.
  • Yongkun Li and JohnC. S. Lui, "Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems," in Performance evaluation,Vol: 67, 2010.
  • Yaserkhamayseh, Ruba Al-Salah and MuneerBani Yassein, "Malicious Nodes Detection in MANETs: Behavioral Analysis Approach," in Journal of Networks, vol:7, No:1, January 2012.
  • Wu Chi, Huang Cheng and Huang Xiaotao, "A Combination Scheme against Pollution Attacks in Network Coding," in IEEE/ACIS International Conference on Computer and Information Science,2012.
  • Yongkun Li and John C. S. Lui, "Epidemic Attacks in Network Coding Enabled Wireless Mesh Networks Detection, Identification and Evaluation," in IEEE.
  • RamandeepKaur and Jaswinder Singh, "Towards Security against Malicious Node Attack in Mobile Ad Hoc Network," in International Journal of Advanced Research in Computer Science and Software Engineering,Volume: 3,Issue: 7, July 2013.