Skip to main content

A Novel Approach for Malicious Node Detection in MANET

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 424))

Abstract

Mobile Ad-hoc Network (MANET) is a collection of wireless nodes without any centralized administration thereby forming an ad-hoc wireless network. MANET has limited battery power, memory, bandwidth, etc. In order to save these resources some nodes stop cooperating in the routing function. These nodes, known as malicious nodes refuse to forward data packets or drop them, thereby degrading the performance of the network. To detect such nodes, an Intrusion Detection System (IDS) is used. Several existing such systems includes Watchdog, Nuggets-based System, TWO-ACK system, etc. However, they fail to detect these nodes in the presences of ambiguous collisions, receiver collisions, limited transmission power, false misbehaviour, and partial dropping. In this paper, a new method is proposed to overcome all the previously specified limitations. The proposed system works under two phases: Detection and Broadcast phase. The detection mode finds out the malicious nodes in the network and determines the truthfulness of the misbehaviour report generated and the broadcast mode distributes the information about malicious nodes throughout the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehaviour in MANETs. IEEE Transaction on Mobile Computing 6(5), 536–550 (2007). IEEE Press, New York

    Article  Google Scholar 

  2. Akbhani, R.H., Patel, S., Jinwala, D.C.: DoS attacks in mobile ad-hoc networks: a survey. Proceedings of Advanced Computing & Communicaions Technologies. 2nd International Meeting, 2012, pp. 535–541. IEEE Press, New York (2012)

    Google Scholar 

  3. Aarti and Tyagi, S.S: Study of MANET: characteristics, challenges, application and security attacks. In: Proceedings of International Journal of Advanced Research on Computer Science and Software Engineering, vol. 3, no. 5, pp. 252–257. IEEE Press, New York (2013). http://www.ijarcsse.com/docs/papers/Volume_3/5_May2013/V3I5-0267.pdf

  4. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking. MOBICOM’00, pp. 255–265. IEEE Press, New York (2000)

    Google Scholar 

  5. Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad-hoc networks. In: Mobile Networks and Applications, vol. 8 no. 5, pp. 579–592. IEEE Press, New York (2003)

    Google Scholar 

  6. Shakshuki, M., Sheltami, R.: EAACK-A secure intrusion detection system for MANEI. IEEE Trans. Ind. Electron. 60(3), 1089–1097 (2013). IEEE Press, New York

    Article  Google Scholar 

  7. IETF MANET working group. http://www.ietf.org/html.charters/manet-charter.html

  8. Toh, C.K.: Ad Hoc Mobile Wireless Networks Protocols and Systems. Prentice Hall PTR, New Jersey (2001)

    Google Scholar 

  9. Kang, N., Shakshuki, E., Sheltami, T.: Detecting forged acknowledgements in MANETs. In: Proceedings of IEEE 25th International Conferences on Advanced Information and Networking Application, Biopolis, Singapore, pp. 488–494. IEEE Press, New York (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. P. Anjana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Anjana, K.P., Preetha, K.G. (2016). A Novel Approach for Malicious Node Detection in MANET. In: Snášel, V., Abraham, A., Krömer, P., Pant, M., Muda, A. (eds) Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-28031-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28031-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28030-1

  • Online ISBN: 978-3-319-28031-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics