CFP last date
22 April 2024
Reseach Article

A Novel Approach towards the Detection of Malicious Nodes in Mobile Ad Hoc Networks

Published on September 2015 by Anup Ashok Patil, Shital Mali
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 3
September 2015
Authors: Anup Ashok Patil, Shital Mali
e8a0d79d-875e-477c-90de-968f4066ca92

Anup Ashok Patil, Shital Mali . A Novel Approach towards the Detection of Malicious Nodes in Mobile Ad Hoc Networks. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 3 (September 2015), 12-16.

@article{
author = { Anup Ashok Patil, Shital Mali },
title = { A Novel Approach towards the Detection of Malicious Nodes in Mobile Ad Hoc Networks },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { September 2015 },
volume = { ICCT2015 },
number = { 3 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 12-16 },
numpages = 5,
url = { /proceedings/icct2015/number3/22648-1549/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Anup Ashok Patil
%A Shital Mali
%T A Novel Approach towards the Detection of Malicious Nodes in Mobile Ad Hoc Networks
%J CAE Proceedings on International Conference on Communication Technology
%@ 0975-8887
%V ICCT2015
%N 3
%P 12-16
%D 2015
%I International Journal of Computer Applications
Abstract

Mobile Ad hoc Network (MANET) is a group of wireless nodes that cooperatively form a network without any pre –established or centralized infrastructural support. All the nodes in the network are moving independently within the same radio rangeand actsas hosts as well as routers. This network is vulnerable to number of attacks while doing data transmission throughout the network. MANETs are more vulnerable to attacks than traditional wired networks because mobile ad hoc network operates on different principles than that of the traditional networks. Security upto some extent is achieved by existing security mechanisms. To achieve acceptable level of the security, the existing security mechanisms should be combined with intrusion detection systems (IDS). There are some existing intrusion detection systems based on acknowledgement, but under certain circumstances these existing systems will not be able to detect the presence of malicious nodes effectively. So, a novel intrusion detection system called Secure Enhanced Adaptive Acknowledgement (SEAACK) is proposed in this paper. The proposed system deals with the issues related to the existing IDS and detect the malicious nodes more effectively than the existing system under certain circumstances while not greatly affecting the network performances.

References
  1. P. Brutch and C. Ko, "Challenges in intrusion detection for wireless ad-hoc networks,"Symposium on Applications and the Internet Workshops IEEE, pp. 368-373, 2003.
  2. A. Nadeem and M. Howarth, "A survey of MANET intrusion detection & prevention approaches for network layer attacks,"2013.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. MobileComput. Netw. Boston, MA, pp. 255- 265, 2000.
  4. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, "On intrusion detection and response for mobile ad hoc networks," in Proc. IEEE Int. Conf. Perform. , Comput. , Commun. ,pp. 747–752, 2004.
  5. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "Anacknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  6. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement", in proc. 24th IEEE International Conference on Advanced Information Networking and Applications,pp. 635-640, 2010.
  7. Qasim M Alriyami, Eleana Asimakopoulou, Nik Bessis "A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks", in proc. IEEE, International Conference on Intelligent Networking and Collaborative Systems, 2014.
  8. Sara CHADLI, Mohamed EMHARRAF, Mohammed SABER, Abdelhak ZIYYAT, "Combination of hierarchical and cooperative models of an IDS for MANETs"in proc. IEEE Tenth International Conference on Signal-Image Technology & Internet-Based Systems, pp. 230-236, 2014.
  9. Akshatha Y. , Dr. Rashmi M. Jogdand, "Enhanced Adaptive Acknowledgement Method for detecting Malicious Nodes in MANET", IOSR journal of Computer Engineering, vol. 16, Issue 4, ver. I, pp 32-38, 2014.
  10. Digital signature, URL: http://cr. yp. to/ecdh. html
Index Terms

Computer Science
Information Sciences

Keywords

Manet Secure Acknowledgement Cryptography False Misbehavior Intrusion Detection.