Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Anomalous Node Detection and Removal in Ad-hoc Network using Enhanced Prime Product Scheme

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 16
Year of Publication: 2015
Authors:
Tariq Siddiqui
Tanveer Farooqui
10.5120/21787-5081

Tariq Siddiqui and Tanveer Farooqui. Article: Anomalous Node Detection and Removal in Ad-hoc Network using Enhanced Prime Product Scheme. International Journal of Computer Applications 122(16):28-33, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Tariq Siddiqui and Tanveer Farooqui},
	title = {Article: Anomalous Node Detection and Removal in Ad-hoc Network using Enhanced Prime Product Scheme},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {16},
	pages = {28-33},
	month = {July},
	note = {Full text available}
}

Abstract

In Associate in Nursing Ad-hoc network may be a assortment of mobile nodes dynamically forming a short lived network while not the employment of any existing network infrastructure or centralized administer. attributable to restricted communication vary among mobile nodes in ad-hoc network, many network hopes is also required to deliver a packet from one node to a different node within the wireless network. Many users want to save its resources like battery power, processing and capability for only their personal use hence such nodes become misbehaving in nature and not co-operate do selfish activities. The security of MANET is manipulated by malicious node attack. In such type of attach, a malicious node insert a fake route reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. To avoid malicious attack, this work gives behavior analysis with PPN (Prime Product Number) scheme for detection and removal of malicious node.

References

  • J. Cho, A. Swami, and I. Chen, "A survey on trust management for mobile ad hoc networks," Communications Surveys Tutorials, IEEE, vol. PP, no. 99, pp. 1 –22, 2010.
  • Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 275–283.
  • Y. -A. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," in SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2003, pp. 135–147.
  • S. Buchegger and J. -Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol. 43, no. 7, pp. 101–107, July 2005.
  • P. -W. Yau and C. J. Mitchell, "Security vulnerabilities in ad hoc networks," in Proceedings of the 7th International Symposium on Communication Theory and Applications, 2003, pp. 99–104.
  • H. Deng, Q. -A. Zeng, and D. Agrawal, "Svm-based intrusion detection system for wireless ad hoc networks," in Proceedings of 2003 IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall. , vol. 3, Oct. 2003, pp. 2147–2151.
  • C. -Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A specification-based intrusion detection system for aodv," in SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2003, pp. 125–134.
  • S. Buchegger and J. -Y. L. Boudec, "A robust reputation system for mobile ad-hoc networks," in Proceedings of P2PEcon, 2003.
  • Q. He, D. Wu, and P. Khosla, "Sori: a secure and objective reputationbased incentive scheme for ad-hoc networks," in Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC '04. , vol. 2, March 2004, pp. 825–830 Vol. 2.
  • S. Buchegger and J. -Y. L. Boudec, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks," in Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003.
  • Jaya Jacob, V. Seethalakshmi. "Performance Analysis and Enhancement of Routing Protocol in MANET", International Journal of Modern Engineering Research (IJMER) ,Vol. 2, Issue. 2, Mar-Apr 2012 pp-323-328.
  • Sandeep Lalasaheb Dhende, Prof. D. M. Bhalerao "Detection/Removal of Black Hole Attack in Mobile Ad-Hoc Networks" International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012.
  • Gambhir, S. ; Sharma, S. , "PPN: Prime product number based malicious node detection scheme for MANETs", IEEE 3rd International on Advance Computing Conference (IACC), Page(s): 335 – 340, IEEE, 2013.
  • Gaeta, R. ; Grangetto, M. , "Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique", IEEE Transactions on Parallel and Distributed Systems, Volume: 24, Issue: 10, Page(s): 1994-2003, IEEE, 2013.
  • Hongjun Dai ; Huabo Liu ; Zhiping Jia ; Tianzhou Chen , "A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs", International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Page(s): 239 - 245, IEEE, 2012.
  • Singh, M. ; Mehta, G. ; Vaid, C. ; Oberoi, P. , "Detection of Malicious Node in Wireless Sensor Network Based on Data Mining", International Conference on Computing Sciences (ICCS), Page(s): 291- 294, IEEE, 2012.
  • Chang, J. -M. ; Tsou, P. -C. ; Woungang, I. ; Chao, H. -C. ; Lai, C. -F. , "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach", IEEE Systems Journal, , Volume: PP, Issue: 99, Page(s): 1- 11, IEEE, 2014.
  • Narayanan, S. S. ; Radhakrishnan, S. , "Secure AODV to combat black hole attack in MANET", International Conference on Recent Trends in Information Technology (ICRTIT), Page(s): 447-452,IEEE, 2013.
  • Amaresh, M. ; Usha, G. , "Efficient malicious detection for AODV in mobile ad-hoc network", International Conference on Recent Trends in Information Technology (ICRTIT), Page(s): 263- 269, IEEE, 2013.
  • Michael G Solomon and Mike Chappel. Information Security Illuminated. Jones and Bartlett, 2004.
  • Tariq Siddiqui, Tanveer Farooqui, "A Survey on Malicious Node Detection in MANET", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, Pages 156-162, December 2014.
  • Harveen, Vanita singh, "Detection of Non Consecutive Malicious Nodes Under Black Hole Attack In Manet", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 3 Issue 11, Pages 3863-3870, November 2014.
  • Sagar Adiya, Rakesh Pandit & Sachin Patel, "Survey of Innovated Techniques To Detect Selfish Nodes In MANET", International Journal of Computer Networking, Wireless and Mobile Communications, Vol. 3, Issue 1, Pages 221-230, IJCNWMC, Mar 2013
  • Jaydip Sen, Sripad Koilakonda, Arijit Ukil, "A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks" 2011.
  • Wenjia Li, Anupam Joshi, Tim Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach", Eleventh International Conference on Mobile Data Management, MDM 2010, Kanas City, Missouri, USA, 23-26 May 2010.
  • Chandandeep kaur, Dr. NavdeepKaur, "Detection and Prevention Techniques for Wormhole Attacks", International Journal of Computer Science and Information Technologies, Vol. 5 (4), Pages 4926-4929, IJCSIT 2014.
  • Gundeep Singh Bindra, Ashish Kapoor, Ashish Narang, "Detection and Removal of Co-operative Blackhole and Grayhole Attacks in MANETs", 2012 International Conference on System Engineering and Technology September 11-12,Bandung, Indonesia, IEEE, 2012.
  • Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández and Pedro García-Teodor, "An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETs", 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.
  • Humaira Ehsan, Farrukh Aslam Khan, "Malicious AODV Implementation and Analysis of Routing Attacks in MANETs", 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.
  • Ruchi Aggarwal, Simmy Rana, "A Comparitative Survey on Malicious Nodes and Their Attacks in MANET", Volume 16, Issue 3, Ver. VII, PP 93-101, IOSR Journal of Computer Engineering (IOSR-JCE), 2014.
  • L. Tamilselvan, and V. Sankaranarayanan, "Prevention of Cooperative black hole attack in manet", Journal of Networks, Vol. 3 (5), pp. 13-20, 2008.
  • Amos J Paul ,Vishnu K "Detection and Removal of Cooperative Black/Gray hole attack in Mobile Adhoc Networks" International Journal of Computer Applications, Volume 1–No. 22, Pages 0975 – 8887, 2010.
  • Saurabh Gupta, Subrat Kar, S Dharmaraja , "BAAP: Black hole Attack Avoidance Protocol for Wireless Network", International Conference on Computer & Communication Technology (ICCCT), IEEE, 2011