CFP last date
20 December 2024
Reseach Article

Prevention of MANETS from Malicious Node Attacks

by Sruthi R, Vijayakumar R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 14
Year of Publication: 2015
Authors: Sruthi R, Vijayakumar R
10.5120/19735-1529

Sruthi R, Vijayakumar R . Prevention of MANETS from Malicious Node Attacks. International Journal of Computer Applications. 112, 14 ( February 2015), 23-25. DOI=10.5120/19735-1529

@article{ 10.5120/19735-1529,
author = { Sruthi R, Vijayakumar R },
title = { Prevention of MANETS from Malicious Node Attacks },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 14 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number14/19735-1529/ },
doi = { 10.5120/19735-1529 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:29.176979+05:30
%A Sruthi R
%A Vijayakumar R
%T Prevention of MANETS from Malicious Node Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 14
%P 23-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANET) is the network which forms when needed with no existing or fixed infrastructure. It is an autonomous system of mobile hosts connected by wireless links. The mobile hosts are free to move independently in any direction. Due to the infrastructure-less design and self-organized mobile nodes the MANETs are prune to different problem, such as routing attacks, security breach problem, one among them is malicious node attack. The malicious node attack is an active attack which causes severe damage to the network. The malicious node can misroute, modify data packets. The proposed trust based mechanism is used to detect and isolate the malicious node from the network. The trust mechanism evaluates the trust value along with the reputation score and isolates the malicious node from active path. The proposed model is simulated using network simulator (NS2).

References
  1. Akanksha Jain, Trust based routing mechanism against black hole attack using AOMDV-IDS system in MANET format, IJETAE ISSN 2250-2459.
  2. A. Rajaram and Dr S. Palaniswami, Malicious node detection system for mobile ad hoc networks, IJCSIT Vol (2) ,2010, 77-85.
  3. Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah, Reliable and fully distributed trust model for mobile ad hoc networks, computers and security 28 (2009) 199- 214.
  4. N. Marchang, R. Datta , A light weight trust based routing protocol for mobile ad hoc networks, IET information security 6 (2) (2012) 77-83.
  5. Bo Wang, Xunxun Chen, Weiling Chang, A light weight trust based QOS routing algorithm for ad hoc networks, pervasive and mobile computing 13 (2014) 164-180.
  6. H Yang H Y, Luo F Ye S W,Lu L Zhang, Security in mobile ad hoc networks: Challenges and solutions, University of California Postprints Year 2004, Paper 618.
  7. G. V. S. Raju ,Rehan Akbani, Mobile Ad Hoc Networks Security, University of Texas at San Antonio, Annual review of communication, volume 58.
  8. Lyno Henrique G. Ferraz, Perdo B. Velloso, Otto Carlos M. B. Duarte, An accurate and precise malicious node exclusion mechanisms for ad hoc networks, Ad hoc networks 19 (2014) 142-155.
  9. Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho, Trust management in mobile ad hoc networks for bias minimization and application performance maximization, Ad Hoc Networks 19 (2014) 59–74.
  10. Neha Shrivastava, Anand Motwani, Survey of malicious attacks in MANET, International Journal of Computer Applications (0975 – 8887), Volume 80 – No 14, October 2013.
  11. Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin H. -M. Sha, Impact of trust model on on-demand multi-path routing in mobile ad-hoc networks, Computer Communications 36 (2013) 1078–1093.
  12. Jin-Hee Cho, Ing-Ray Chen, On the tradeoff between altruism and selfishness in MANET trust management.
  13. Anit kumar, Pardeep Mittal, A comparative study of AODV and DSR routing protocols in Mobile ad-hoc networks, ijarcsse, Volume 3, Issue 5, May 2013, ISSN: 2277 128X .
  14. Durgesh Wadbude, Vineet Richariya, An efficient secure AODV routing protocol in MANET, IJEIT, Volume 1, Issue 4, April 2012, ISSN: 2277-3754.
  15. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, Review of Various Routing Protocols for MANETs, International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANET trust malicious node trust value reputation score