CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network

by Pragya Singhal, Rakesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 3
Year of Publication: 2013
Authors: Pragya Singhal, Rakesh Kumar
10.5120/10612-5328

Pragya Singhal, Rakesh Kumar . Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications. 64, 3 ( February 2013), 11-15. DOI=10.5120/10612-5328

@article{ 10.5120/10612-5328,
author = { Pragya Singhal, Rakesh Kumar },
title = { Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 3 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number3/10612-5328/ },
doi = { 10.5120/10612-5328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:25.490180+05:30
%A Pragya Singhal
%A Rakesh Kumar
%T Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 3
%P 11-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Mobile Adhoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. MANET rely on cooperation of all participating nodes, thus they are vulnerable to sel?sh nodes. An individual mobile node may attempt to benefit from other nodes, but refuse to share its own resources. Such nodes are called selfish or misbehaving nodes. These selfish nodes may severely affect the performance of network. Selfish node attack is a kind of Passive attack. In this paper misbehavior of Selfish Nodes is evaluated by finding the packet delivery ratio, energy consumption, end to end delivery and collisions by varying node mobility and number of attackers. Misbehaving nodes presence is one major security threat in MANET that can affect the performance of the under-lying protocols. Experiments are performed by implementing this through simulation using Glomosim Simulator and use AODV routing protocol. Results show that this drops the network performance.

References
  1. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei (Department of Computer Science and Engineering) Florida Atlantic University, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", 2006 Springer.
  2. Geetha Jayakumar, and G. Gopinath, "Ad Hoc Mobile Wireless Networks Routing Protocols", Journal of Computer Science 3 (8), 2007, pp. 574-582.
  3. Sunil Taneja and Ashwani Kush, "A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010, pp. 279-285.
  4. Felix Lau , Stuart H. Rubin , Michael H. Smith, Lj ilj ana Traj koviC, "Distributed Denial of Service Attacks", June 2000, IEEE, pp. 2275-2280.
  5. G. S. Mamatha and Dr. S. C. Sharma, "Network Layer Attacks and Defense Mechanisms in MANETS- A Survey", International Journal of Computer Applications, Volume 9, No. 9, November 2010, pp. 12-17.
  6. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc on-demand distance vector (AODV) routing", RFC 3561, IETF; July 2003.
  7. T. V. P. Sundararajan, Dr. A. Shanmugam, "Performance Analysis of Selfish Node Aware Routing Protocol for Mobile Ad Hoc Networks", ICGST-CNIR Journal, Volume 9, Issue 1, July 2009.
  8. Sung-Ju Lee, Elizabeth M. Belding-Royer, Charles E. Perkins, "Ad hoc On-Demand Distance-Vector Routing Scalability", Mobile Computing and Communications Review, Volume 1, Number 2.
  9. Cong Hoan Vu, Adeyinka Soneye, "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks", Thesis no: MCS-2009:4, June2009.
  10. Felix Lau, Stuart H. Rubin, Michael H. Smith and Ljiljana TrajkoviC; "Distributed Denial of Service Attacks"; 2004 IEEE; pp. 2275-2280
  11. Martin Schütte "Detecting Sel?sh and Malicious Nodes in MANETs" seminar: sicherheit in selbstorganisierenden netzen, hpi/universität potsdam, sommersemester 2006.
  12. Hong-Peng Wang, Lin Cui, "An Enhanced AODV for Mobile Ad Hoc Network", Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008, IEEE.
  13. Stephen M. Specht and Ruby B. Lee; "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures"; Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, September 2004; pp. 543-550.
  14. GloMoSim; Available on: http://pcl. cs. ucla. edu/projects/glomosim.
  15. Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay; "Different Types of Attacks on Integrated MANET-Internet Communication", International Journal of Computer Science and Security (IJCSS), Volume (4), Issue (3), pp. 265-274.
  16. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc on-demand distance vector (AODV) routing", RFC 3561, IETF; July 2003.
Index Terms

Computer Science
Information Sciences

Keywords

AODV DoS Glomosim MANET PDR Routing