Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 19
Year of Publication: 2012
G. Indirani
K. Selvakumar

G Indirani and K Selvakumar. Article: Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications 50(19):1-6, July 2012. Full text available. BibTeX

	author = {G. Indirani and K. Selvakumar},
	title = {Article: Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {19},
	pages = {1-6},
	month = {July},
	note = {Full text available}


In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MANET). In this technique, the nodes with highest trust value, residual bandwidth and residual energy are selected as active nodes using swarm intelligence based ant colony optimization. Each active node monitors its neighbour nodes and estimates the trust value. If the active node finds any node below a minimum trust threshold, then the node is marked as malicious and an alert message is sent to the source node. When the source node wants to forward the data packet to destination, it discards the malicious nodes in that path and bypasses the data through other nodes in alternate path. It also performs the certificate revocation process for the malicious nodes. By simulation results, we show that the proposed approach reduces overhead.


  • Sevil Sen, and John A. Clark, "A grammatical evolution approach to intrusion detection on mobile ad hoc networks", Proceedings of the second ACM conference on Wireless network security (WiSec '09).
  • Sureyya Mutlu, and Guray Yilmaz, " A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs", The Seventh International Conference on Networking and Services(ICNS), pp 292 to 298, 2011
  • Sumitra Menaria, Prof Sharada Valiveti, and Dr K Kotecha, "Comparative study of Distributed Intrusion Detection in Ad-hoc Networks", International Journal of Computer Applications, Volume 8– No. 9, October 2010.
  • N. Shanthi, Dr. L. Ganesan, and Dr. K. Ramar, " Study of different attacks on multicast mobile ad hoc networks", Journal of Theoretical and Applied Information Technology, 2005-2009
  • A. K. Rai, R. R. Tewari, and S. K. Upadhyay, "Different Types of Attacks on Integrated MANET-Internet Communication", International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) 265 pp 245-74.
  • S. Mangai, and A. Tamilarasi, "An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks", Journal of Computer Science. , pp 505-511, 2011.
  • G. Indirani, and Dr. K. Selvakumar ,"A Swarm Based Efficient Distributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET)"
  • Quan Jia, Kun Sun, and Angelos Stavrou, " CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET", Proceedings of 20th international conference on computer communications and networks (ICCCN), pp 1 – 6, 2011
  • Alicherry, M, Keromytis, A. D, Stavrou. A, "Evaluating a collaborative defense architecture for MANETs", IEEE International conference on internet multimedia services architecture and applications (IMSAA), pp 1 – 6, 2009.
  • S. Venkatasubramanian, and N. P. Gopalan, "A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET", International Journal of Computer Applications (IJCA), pp 7-11, 2011.
  • HyoJin Kim, Ramachandra Bhargav Chitti, and JooSeok Song,"Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks", Journal of Information Processing Systems, Vol. 7, No. 1, March 2011.
  • Hwee-Xian Tan, and Winston K. G. Seah, "Framework for Statistical Filtering Against DDoS Attacks in MANETs", 2nd international conference on embedded software and systems, pp 8, 2005.
  • Venkatesan Balakrishnan, Vijay Varadharajan, and Udaya Kiran Tupakula, "Fellowship: Defense against Flooding and Packet Drop Attacks in MANET", IEEE /IFIP Network Operations and Management Symposium (NOMS), pp 1-4, 2006.
  • Wei Yu, Yan Sun, and K. J. Ray Liu, "HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks", Proceedings: 24th annual joint conference of the IEEE computer and communications societies (INFOCOM), pp 1252 – 1261, vol. 2, 2005.
  • Hu, Y-C, Perrig, A. ; Johnson, D. B. , " Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks", 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), pp 1976 - 1986 vol. 3, 2003
  • Rizwan Khan, and A. K. Vatsa, "Detection and Control of DDOS Attacks over Reputation and Score Based MANET", Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011.
  • Hai Vu, Ajay Kulkarni, Kamil Sarac, and Neeraj Mittal, " WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks", Proceeding of the Third International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2008
  • C. W. Chen, "IDMA: improving the defense against malicious attack for ad hoc networks based on ARIP," Proceedings of SPIE Defense and Security Symposium Conference on "Mobile Multimedia/Image Processing, Security, and Applications, March 2008, Orlando, USA
  • Vinay Rishiwal, S. Verma, and S. K. Bajpai, "QoS Based Power Aware Routing in MANETs", International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009.
  • Tolba, F. D. Magoni, D. Lorenz, P, "Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks", IEEE Global Telecommunications Conference (GLOBECOM), pp 2786-2790, 2007.
  • Yaling Yang, and Kravets, R, "Contention-Aware Admission Control for Ad Hoc Networks",IEEE Transactions on mobile computing", pp 363-377, Vol 4, issue 4, 2005.