CFP last date
20 May 2024
Reseach Article

Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s)

by Raj Mohan Mumgai, Sandip Vijay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 4
Year of Publication: 2012
Authors: Raj Mohan Mumgai, Sandip Vijay
10.5120/9267-3447

Raj Mohan Mumgai, Sandip Vijay . Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s). International Journal of Computer Applications. 58, 4 ( November 2012), 1-5. DOI=10.5120/9267-3447

@article{ 10.5120/9267-3447,
author = { Raj Mohan Mumgai, Sandip Vijay },
title = { Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s) },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 4 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number4/9267-3447/ },
doi = { 10.5120/9267-3447 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:33.722530+05:30
%A Raj Mohan Mumgai
%A Sandip Vijay
%T Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s)
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 4
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc network is a heterogeneous network. They have very particular features such as high mobility, multi-hop routing, open system and the absence of any fix infrastructure. An ad-hoc network faces different type of security attack. In this paper, we discuss our implementation of the AODV protocol extension namely Malicious Node Attack Preventer (MNAP). AODV extension mechanism improves the AODV behavior. MNAP used the reserved field of RREQ and RREP packet format. MNAP implements security in AODV against black-hole and gray-hole attacks. Analyzes has been done based on PDR, throughput and delay of the node selected by doing simulation on Qualnet network simulator.

References
  1. X. Hong, K. Hu and M. grela, " Scelable Routing Protocol for Mobile Ad-Hoc Networks," IEEE Networks, vol. 16 no. 4, July-Aug. 2002, pp. 11-12.
  2. IETF Working Group: Mobile Adhoc Networks (manet). http://datatracker. ietf. org/wg/manet/charter/
  3. Stefano Basagni, Marco Conti, Slivia Giordano and Ivan stojmenovic," Mobile Ad-hoc Networking," 2004, pp. 10-29
  4. P. G. Argyoudis and D. O'Mahony," Secure Routing for Mobile Ad-hoc Networks," IEEE Commun. Surveys & Tutorial, vol. 7, no. 3, pp. 2-21
  5. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," IETFRFC 3561, July 2003.
  6. C. E. Perkins and E. M. Royer, "Ad Hoc On-Demand Distance Distance Vector Routing," Proc. 2nd IEEEWkspMobile Comp. Sys. and Apps. , New Orleans, LA, Feb. 1999, pp. 90–100
  7. L. Gong, D. J. Wheeler, "A Matrix Key Distribution Scheme," Journal of Cryptology, 2(2), pp 51-59, 1990.
  8. BalaKrishan, M. ,"Symmetric key management and distribution technique in wireless ad-hoc networks" IEEE conference publication, Pages: 727, year 2011
  9. S. JabeenBeguma,*, Dr. T. Purusothaman b,1, G. Vidhya,"An Efficient Key Pre-distribution Schemefor Multiple Attacks,"Journal of Computer Applications (JCA)Volume IV, Issue 3, 2011
  10. H. Shafiei, A. Mehdizadeh, A. Khonsari and M. Ould-Khaoua. A Combinatorial Approach forKey-Distribution in Wireless Sensor Networks. In Proc of the IEEE "GLOBECOM" 2008.
  11. M. Ramkumar, N. Memon, "An Efficient Key Predistribution Scheme for MANET Security," submitted to the IEEE Journal on Selected Areas of Communication
  12. M. G. Zapata, N. Asokan, "Securing Ad-Hoc Routing Protocols," Proceedingsof the 2002 ACM Workshop on Wireless Security (WiSe 2002),pages 1-10. September 2002.
  13. Abusalah, L. ; Khokhar, A. ; Guizani, M,'A survey of secure mobile Ad Hoc routing protocols Communications Surveys & Tutorials, IEEE Volume: 10 , Issue: 4 Publication Year: 2008 , Page(s): 78 - 93
  14. Megha Arya, Yogendra Kumar Jain,"Grayhole Attack and Prevention in Mobile Adhoc Network," IJCA, Volume 27– No. 10, August 2011
  15. Madhusudhananaga kumarKS ,G. Aghila "A Survey on Black Hole Attacks on AODV Protocol in MANET", IJCA, Volume 34– No. 7, November 2011
  16. D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks,T. Imilinski and H. Korth, Eds. Kluwer Academic Publishers, 1996.
  17. Qualnet Simulator
Index Terms

Computer Science
Information Sciences

Keywords

AODV MNAP Non-Trustworthy Trustworthy Qualnet