CFP last date
20 May 2024
Reseach Article

Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

by Radhika Saini, Manju Khari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 4
Year of Publication: 2011
Authors: Radhika Saini, Manju Khari

Radhika Saini, Manju Khari . Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network. International Journal of Computer Applications. 20, 4 ( April 2011), 18-21. DOI=10.5120/2422-3251

@article{ 10.5120/2422-3251,
author = { Radhika Saini, Manju Khari },
title = { Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 4 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { },
doi = { 10.5120/2422-3251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T20:06:54.010755+05:30
%A Radhika Saini
%A Manju Khari
%T Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 4
%P 18-21
%D 2011
%I Foundation of Computer Science (FCS), NY, USA

Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

  1. C.Siva Ram Murthy and B S Manoj, ―Mobile Ad Hoc Networks-Architecture and Protocols‖, Pearson Education, ISBN 81-317-0688-5 ,2004.
  2. Theodore S. Rappaport, “Wireless Communication” Prentice Publisher, ISBN 0133755363, January 1994.
  3. B. Wu et al, ―A Survey of Attacks and Preventions in Mobile Ad Hoc Networks,‖ Wireless/Mobile Network Security, Springer, Vol 17, 2006.
  4. Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture, International Journal of Electronics Engineering, pp. 189-196, 2010
  5. William Stallings “Cryptography and Network Security”, Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006
  6. Lioyd,S. and Adams,C.”Understanding PKI: Concepts, Standards and Deployment Considerations” ISBN 0-672-32391-5
  7. Patcha,A and Mishra,A - Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, IEEE. 2003
  8. Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009
  9. “Intrusion Detection System”, Link visited on December 2010
  10. Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010
  11. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad Hoc Routing for Wireless Networks”, Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001
  12. Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  13. Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, “A secure Routing Protocol for Ad hoc networks”, In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP’ 02), pp. 78-87, November 2002.
  14. Alfawaer,Z. And Al Zoubi,S. , ”A Proposed Security Subsystem for Ad Hoc Networks” International Forum on Computer Science Technology and Applications,IEEE 2009
Index Terms

Computer Science
Information Sciences


Ad Hoc Network Nodes Security Attack Malicious Behavior