CFP last date
22 April 2024
Reseach Article

Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET

by Nirav J. Patel, Rutvij H. Jhaveri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 4
Year of Publication: 2015
Authors: Nirav J. Patel, Rutvij H. Jhaveri
10.5120/21689-4794

Nirav J. Patel, Rutvij H. Jhaveri . Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET. International Journal of Computer Applications. 122, 4 ( July 2015), 26-32. DOI=10.5120/21689-4794

@article{ 10.5120/21689-4794,
author = { Nirav J. Patel, Rutvij H. Jhaveri },
title = { Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 4 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number4/21689-4794/ },
doi = { 10.5120/21689-4794 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:42.516675+05:30
%A Nirav J. Patel
%A Rutvij H. Jhaveri
%T Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 4
%P 26-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network is suffering with various attacks due to the infrastructure-less network. Hence, MANET needs very specific security methods to detect false entrance of the misbehavior nodes. The networks work well if the nodes are trusty and act rightly cooperatively. In this paper, we are identifying and detecting packet dropping nodes using Support vector machine. Support vector machine is used reactively to classify nodes in two different classes either normal or malicious nodes. SVM takes as input the neighbor trust value, calculated with data packets and control packets. Our technique is implemented with AODV (Ad-hoc on demand vector routing) protocol. Our experimental results evaluated using packet delivery ratio (PDR), End-To-End delay, Average throughput, Normalized Routing Overhead, Average Energy Consumption.

References
  1. Basangi, S. , Conti, M. , Giordano, S. and Stojmenovic, I. , "Mobile ad hoc networking" , IEEE Press, Wiley-Interscience, pp-282, IEEE, 2004.
  2. Abderrahmane Baadache and Ali Belmehdi, "Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks", Elsevier Journal of Network and Computer Applications 35, pp-1130–1139. Availavle at SciVerse ScienceDirect, Elsevier, 2012.
  3. Michie, Donald, David J. Spiegelhalter, and Charles C. Taylor. , "Machine learning, neural and statistical classification. ", 1994.
  4. Li, Wenjia, Anupam Joshi, and Tim Finin. , "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks. ", In MIL• ITARY COMMUNICATIONS CONFERENCE, 20Il-MILCOM 20Il, pp- 1102-1107, IEEE,2011.
  5. Patel, Meenakshi, and Sanjay Sharma. , "Detection of malicious attack in MANET a behavioral approach. ", In Advance Computing Conference (IACC), 2013 IEEE 3rd International, pp-388-393, IEEE, 2013.
  6. Barani, Fatemeh, and Sajjad Gerami, "ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs. ", In Information Security and Cryptology (ISCISC), 2013 10th International ISC Conference on, pp- 1-6. IEEE, 2013.
  7. Patel, Meenakshi, Sanjay Sharma, and Divya Sharan. , "Detection and Prevention of Flooding Attack Using SVM. ", In Communication Systems and Network Technologies (CSNT), 2013 International Conference on, pp- 533-537, IEEE, 2013.
  8. Akbani, Rehan, Turgay Korkmaz, and G. V. S. Raju. , "A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior. ", In Global Telecommunications Conference, 2008, IEEE GLOBECOM 2008, IEEE, pp- 1-5. IEEE, 2008.
  9. Li, Wenjia, Anupam Joshi, and Tim Finin. , "Sat: an svm-based automated trust management system for mobile ad-hoc networks. ", In MILITARY COMMUNICATIONS CONFERENCE, 2011-MILCOM 2011, pp- 1102-1107, IEEE, 2011.
  10. Akbani, Rehan, Turgay Korkmaz, and G. V. S. Raju. , "Defending against malicious nodes using an SVM based reputation system. ", In Military Communications Conference, 2008, MILCOM 2008, IEEE, pp- 1-7, IEEE, 2008.
  11. Forster, Anna. , "Machine learning techniques applied to wireless ad-hoc networks: Guide and survey. ", In Intelligent Sensors, Sensor Networks and Information, 2007,ISSNIP 2007, 3rd International Conference on, pp- 365-370, IEEE, 2007.
  12. Kautoo, Priya, Piyush Kumar Shukla, and Sanjay Silakari. , "Trust Formulization in Dynamic Source Routing Protocol Using SVM. ", International Journal of Information Technology and Computer Science (IJITCS) 6, no- 8,2014
  13. Patel, Nirav J. , and Rutvij H. Jhaveri. "Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey. " In Signal Processing And Communication Engineering Systems (SPACES), 2015 International Conference on, pp. 468-472. IEEE, 2015.
  14. Patel, Nirav J. , and Rutvij H. Jhaveri. "Trust Based Approaches for Secure Routing in VANET: A Survey. " Procedia Computer Science 45 (2015): 592-601.
  15. Bar, Radha Krishna, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh. "QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack. " Procedia Technology 10 (2013): 530-537.
  16. Basangi, S. , Conti, M. , Giordano, S. and Stojmenovic, I. , "Mobile ad hoc networking" , IEEE Press, Wiley-Interscience, pp-282, IEEE, 2004
  17. Alsheikh, Mohammad Abu, Shaowei Lin, Dusit Niyato, and Hwee-Pink Tan. , "Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. ", 2014.
  18. Michie, Donald, David J. Spiegelhalter, and Charles C. Taylor. , "Machine learning, neural and statistical classification. ", 1994.
  19. Kannhavong, Bounpadith, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour. , "A survey of routing attacks in mobile ad hoc networks. ", Wireless communications, IEEE 14, no. 5, pp-85-91, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network machine learning techniques packet dropping attacks support vector machine (SVM)