Open Access   Article Go Back

A Review of Malicious Node Detection in Mobile Ad-hoc Networks

D.D. Punwatkar1 , K.N. Hande2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-2 , Page no. 65-69, Feb-2014

Online published on Feb 28, 2014

Copyright © D.D. Punwatkar, K.N. Hande . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D.D. Punwatkar, K.N. Hande, “A Review of Malicious Node Detection in Mobile Ad-hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.65-69, 2014.

MLA Style Citation: D.D. Punwatkar, K.N. Hande "A Review of Malicious Node Detection in Mobile Ad-hoc Networks." International Journal of Computer Sciences and Engineering 2.2 (2014): 65-69.

APA Style Citation: D.D. Punwatkar, K.N. Hande, (2014). A Review of Malicious Node Detection in Mobile Ad-hoc Networks. International Journal of Computer Sciences and Engineering, 2(2), 65-69.

BibTex Style Citation:
@article{Punwatkar_2014,
author = {D.D. Punwatkar, K.N. Hande},
title = {A Review of Malicious Node Detection in Mobile Ad-hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {65-69},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=54},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=54
TI - A Review of Malicious Node Detection in Mobile Ad-hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - D.D. Punwatkar, K.N. Hande
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 65-69
IS - 2
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3640 3495 downloads 3612 downloads
  
  
           

Abstract

Ad-hoc networks are a new paradigm of wireless communication for mobile hosts where node mobility causes frequent changes in topology. Ad hoc networks are self-configurable and autonomous systems consisting of routers and hosts, which are able to support movability and organize themselves arbitrarily. Moreover, other characteristics such as frequent changes of the topology, nodes limitations like energy resource, storage device, CPU and communication channel limitations like bandwidth, reliability add extra challenges. Mobile ad hoc networks aimed to propose solutions to some fundamental problems, such as routing, coping with the new challenges caused by networks and nodes features without taking the security issues into account. Hence, all these solutions are vulnerable to threats. Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. This paper is a survey on different malicious node detection mechanisms, and the security problems caused due to malicious nodes in mobile ad hoc networks.

Key-Words / Index Term

Mobile Ad Hoc Networks, Malicious Behavior, Malicious Node Detection Mechanisms, Security

References

[1]. R. Gopal, V. Parthasarathy, A.Mani,� Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks�, IEEE International Conference on Computer Communication and Informatics (ICCCI -2013), Jan 2013.
[2]. Dipali Koshti and Supriya Kamoji, � Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks� International Journal of Soft Computing and Engineering (IJSCE) , Volume-1, Issue-4, September 2011.
[3]. Radhika Saini and Manju Khari, � Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network� International Journal of Computer Applications, Volume 20� No.4, April 2011.
[4]. G.S. Mamatha and Dr. S.C. Sharma, � Network Layer Attacks and Defense Mechanisms in MANETS- A Survey� International Journal of Computer Applications (0975 � 8887),Volume 9� No.9, November 2010.
[5]. Jaswinder Singh and Ramandeep Kaur , �Towards Security against Malicious Node Attack in Mobile Ad Hoc Network�, IJARCSSE Volume 3, Issue 7, July 2013.
[6]. S.B.Aneith Kumar S.Allwin Devaraj J. Arun kumar, � Efficient Detection of Denial of Service Attacks in MANET� IJARCSSE, Volume 2, Issue 5, May 2012.
[7]. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, �A Survey Of Routing Tacks In Mobile Ad Hoc Networks� IEEE Wireless Communications, October 2007.
[8]. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, And Lixia Zhang, �Security In Mobile Ad Hoc Networks: Challenges And Solutions� IEEE Wireless Communications, February 2004.
[9]. C.Siva Ram Murthy and B S Manoj, ―Mobile Ad Hoc Networks-Architecture and Protocols, Pearson Education,ISBN 81-317-0688-5 ,2004.
[10]. Theodore S. Rappaport, �Wireless Communication� Prentice Publisher, ISBN 0133755363, January 1994.
[11]. �Intrusion Detection System� http://www.intrusiondetection system-group.co.uk/, Link visited on December 2010.
[12]. William Stallings �Cryptography and Network Security�, Fourth Edition, Pearson Education. ISBN 978-81- 7758-774-6, 2006
[13]. Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks(MANETs):ABigPicture,International Journal of Electronics Engineering, pp. 189-196, 2010.
[14]. S. Buchegger and J. Boudec, �Performance Analysis of the Confidant Protocol,� Proc. Int�l Symp, Mobile Ad Hoc Networking and Computing, 2002.
[15]. Y.Huang and W.Lee, �A cooperative IDS for adhoc network Security of adhoc and sensor networks�, ACM, 2003,pp.135-145.
[16]. D. Djenouri and N. Badache, �Struggling against
selfishness and black hole attacks in MANETs,� Wireless Commun. and Mobile Computing, no. 8, pp. 689�704, 2008.
[17]. V. Srinivasan, P. Nuggehalli, C.F. Chiasserini and R.R Rao,�Cooperation in wireless Ad Hoc Network�, in IEEE INFOCOM, California, USA, 2003.
[18]. Li Zhao and Jos� G. Delgado-Frias `MARS: Misbehavior Detection in Ad Hoc Networks� IEEE GLOBECOM 2007 proceedings.
[19]. Idris M. Atakli, Hongbing Hu, Yu Chen*,Wei-Shinn Ku ,Zhou Su �Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation� 2008 SpringSim
[20]. Dahai DU, Hong FAN, Guan WANG� A Secure Routing Protocol for Mobile Ad hoc Networks �Journal of Computational Information Systems 9: 22 (2013) 9023�9030
[21]. Tarag Fahad & Robert Askwith�A Node Misbehaviour Detection Mechanism for Mobile Ad-hoc Networks � ISBN: I-9025-6013-9c 2006 PGNet.