CFP last date
20 May 2024
Reseach Article

Detecting Malicious Nodes in MANET based on a Cooperative Approach

Published on None 2011 by Reena Sahoo, Dr. P. M. Khilar
2nd National Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN - Number 4
None 2011
Authors: Reena Sahoo, Dr. P. M. Khilar
30097fff-edcb-42a3-a228-540f211b981f

Reena Sahoo, Dr. P. M. Khilar . Detecting Malicious Nodes in MANET based on a Cooperative Approach. 2nd National Conference on Computing, Communication and Sensor Network. CCSN, 4 (None 2011), 46-51.

@article{
author = { Reena Sahoo, Dr. P. M. Khilar },
title = { Detecting Malicious Nodes in MANET based on a Cooperative Approach },
journal = { 2nd National Conference on Computing, Communication and Sensor Network },
issue_date = { None 2011 },
volume = { CCSN },
number = { 4 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 46-51 },
numpages = 6,
url = { /specialissues/ccsn/number4/4565-ccsn033/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 2nd National Conference on Computing, Communication and Sensor Network
%A Reena Sahoo
%A Dr. P. M. Khilar
%T Detecting Malicious Nodes in MANET based on a Cooperative Approach
%J 2nd National Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN
%N 4
%P 46-51
%D 2011
%I International Journal of Computer Applications
Abstract

Mobile Ad hoc Network (MANET) is a self configuring network of mobile nodes connected by wireless links and considered as network without infrastructure. Securing MANETs is an important part of deploying and utilizing them, since they are often used in critical applications where data and communications integrity is important. Existing solutions for wireless networks can be used to obtain a certain level of such security. These solutions may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these solutions. In the network, some malicious nodes pretend to be intermediate nodes of a route to some given destinations, drop any packet that subsequently goes through it, is one of the major types of attack. We propose a cooperative method to detect malicious nodes in MANETs. The mechanism is cooperative because nodes in the protocol work cooperatively together so that they can analyze, detect malicious nodes in a reliable manner. We verify our method by running simulations with mobile nodes using Ad-hoc on-demand Distance Vector (AODV) routing. It is observed that the malicious node detection rate is very good; the overhead detection rate is low, packet delivery ratio is little bit high and also the response time is observed when there is a change of mobility speed.

References
  1. Suman Deswal and Sukhbir Singh,” Implementation of Routing Security Aspects in AODV”, International Journal of Computer Theory and Engineering. Vol. 2, No. 1, February, 2010.
  2. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang,”Security in Mobile Ad hoc Networks: Challenges and Solutions”, UCLA Computer Science Department.
  3. Jongoh Choi, Si-Ho Cha, GunWoo Park, and JooSeok Song.”Malicious Nodes Detection in AODV-Based Mobile Ad Hoc Networks” GESTS Int’l Trans. Computer Science and Engr., Vol.18, No.1 49, Oct.2005.
  4. Satoshi Kurosawa , Hidehisa Nakayama, Nei Kato, Abbas Jamalipur, Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad hoc Networks by Dynamic Larning Method”, International Journal of Network Security, Vol.5, No. 3,pp.338-346, Nov. 2007.
  5. A Rajaram, Dr.S.Palaniswami.” Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (2), 2010.
  6. Aishwarya Sagar Anand Ukey, Meenu Chawla,” Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No. 1, July 2010.
  7. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard.” Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”.
  8. Ganesh Reddy, P.M. Khilar.”Routing Misbehavior Detection and Reaction in MANETs”, Proceedings of International Conference on Industrial and Information System, 2010, Surathkell.
  9. Sunil kumar Senapati, Pabitra Mohan Khilar, “Securing FSR against data dropping by malicious nodes”, International Journal of Computer Applications in Engineering, Technology and Sciences (IJ-CA-ETS), ISSN: 0974-3596, April’09-September’09.
  10. Fanzhi Li and Sabah Jassim.” Malicious nodes seriously affect the performance of mobile ad hoc networks”.
  11. Dr. Nakkeeran, B.Partibane, S.Sakthivel Murugan, N.Prabagarane.” Detecting the malicious faults in MANET”.
  12. Charles E Perkins, Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector Routing”.
  13. Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber, “Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks”, University of UIm, Dep. Of Multimedia Computing, UIm, Germany.
  14. Po-Wah Yau; Mitchell, C.J., "Reputation methods for routing security for mobile ad hoc networks”, Mobile Future and Symposium on Trends in Communications, 2003.
  15. Payal N Raj, Prashant B. Swadas, “DPRAODV: A Dynamic Larning System Against Blackhole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
  16. Akanksha Saini, Harish Kumar,” Comparision between Various Blackhole Detection Techniques in MANET”, NCCI 2010 -National Conference on Computational Instrumentation CSIO Chandigarh, INDIA, 19-20 March 2010.
  17. Juan-Carlos Ruiz, Jesús Friginal, David de-Andrés, Pedro Gil,” Black Hole Attack Injection in Ad hoc Networks”.
  18. N Bhalaji, Sinchan banerjee, A.Shanmugam, “A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks”, Journal of Computer Science 4 (7): 538-544, 2008.
  19. Ganesh Reddy, P.M. Khilar.”Secure Routing in MANET”, International Journal of Data Warehousing, Vol.2 No.1, Jun-2010, pp.53-62.
  20. S Rangrajan, et. al., “A Distributed System level Diagnosis Algorithm for Arbitrary Network Topologies, IEEE Trans. on comp. Vol 44, No. 2, February 1995,pp.312-334.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Malicious Overhead Packet delivery ratio Black hole AODV