Abstract
Mobile Ad-hoc Network (MANET) is a collection of wireless nodes without any centralized administration thereby forming an ad-hoc wireless network. MANET has limited battery power, memory, bandwidth, etc. In order to save these resources some nodes stop cooperating in the routing function. These nodes, known as malicious nodes refuse to forward data packets or drop them, thereby degrading the performance of the network. To detect such nodes, an Intrusion Detection System (IDS) is used. Several existing such systems includes Watchdog, Nuggets-based System, TWO-ACK system, etc. However, they fail to detect these nodes in the presences of ambiguous collisions, receiver collisions, limited transmission power, false misbehaviour, and partial dropping. In this paper, a new method is proposed to overcome all the previously specified limitations. The proposed system works under two phases: Detection and Broadcast phase. The detection mode finds out the malicious nodes in the network and determines the truthfulness of the misbehaviour report generated and the broadcast mode distributes the information about malicious nodes throughout the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehaviour in MANETs. IEEE Transaction on Mobile Computing 6(5), 536–550 (2007). IEEE Press, New York
Akbhani, R.H., Patel, S., Jinwala, D.C.: DoS attacks in mobile ad-hoc networks: a survey. Proceedings of Advanced Computing & Communicaions Technologies. 2nd International Meeting, 2012, pp. 535–541. IEEE Press, New York (2012)
Aarti and Tyagi, S.S: Study of MANET: characteristics, challenges, application and security attacks. In: Proceedings of International Journal of Advanced Research on Computer Science and Software Engineering, vol. 3, no. 5, pp. 252–257. IEEE Press, New York (2013). http://www.ijarcsse.com/docs/papers/Volume_3/5_May2013/V3I5-0267.pdf
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking. MOBICOM’00, pp. 255–265. IEEE Press, New York (2000)
Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad-hoc networks. In: Mobile Networks and Applications, vol. 8 no. 5, pp. 579–592. IEEE Press, New York (2003)
Shakshuki, M., Sheltami, R.: EAACK-A secure intrusion detection system for MANEI. IEEE Trans. Ind. Electron. 60(3), 1089–1097 (2013). IEEE Press, New York
IETF MANET working group. http://www.ietf.org/html.charters/manet-charter.html
Toh, C.K.: Ad Hoc Mobile Wireless Networks Protocols and Systems. Prentice Hall PTR, New Jersey (2001)
Kang, N., Shakshuki, E., Sheltami, T.: Detecting forged acknowledgements in MANETs. In: Proceedings of IEEE 25th International Conferences on Advanced Information and Networking Application, Biopolis, Singapore, pp. 488–494. IEEE Press, New York (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Anjana, K.P., Preetha, K.G. (2016). A Novel Approach for Malicious Node Detection in MANET. In: Snášel, V., Abraham, A., Krömer, P., Pant, M., Muda, A. (eds) Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-28031-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-28031-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28030-1
Online ISBN: 978-3-319-28031-8
eBook Packages: EngineeringEngineering (R0)