CFP last date
20 January 2025
Reseach Article

Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

by Radhika Saini, Manju Khari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 4
Year of Publication: 2011
Authors: Radhika Saini, Manju Khari
10.5120/2422-3251

Radhika Saini, Manju Khari . Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network. International Journal of Computer Applications. 20, 4 ( April 2011), 18-21. DOI=10.5120/2422-3251

@article{ 10.5120/2422-3251,
author = { Radhika Saini, Manju Khari },
title = { Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 4 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number4/2422-3251/ },
doi = { 10.5120/2422-3251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:54.010755+05:30
%A Radhika Saini
%A Manju Khari
%T Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 4
%P 18-21
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

References
  1. C.Siva Ram Murthy and B S Manoj, ―Mobile Ad Hoc Networks-Architecture and Protocols‖, Pearson Education, ISBN 81-317-0688-5 ,2004.
  2. Theodore S. Rappaport, “Wireless Communication” Prentice Publisher, ISBN 0133755363, January 1994.
  3. B. Wu et al, ―A Survey of Attacks and Preventions in Mobile Ad Hoc Networks,‖ Wireless/Mobile Network Security, Springer, Vol 17, 2006.
  4. Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture, International Journal of Electronics Engineering, pp. 189-196, 2010
  5. William Stallings “Cryptography and Network Security”, Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006
  6. Lioyd,S. and Adams,C.”Understanding PKI: Concepts, Standards and Deployment Considerations” ISBN 0-672-32391-5
  7. Patcha,A and Mishra,A - Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, IEEE. 2003
  8. Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009
  9. “Intrusion Detection System” http://www.intrusion-detection-system-group.co.uk/, Link visited on December 2010
  10. Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010
  11. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad Hoc Routing for Wireless Networks”, Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001
  12. Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  13. Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, “A secure Routing Protocol for Ad hoc networks”, In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP’ 02), pp. 78-87, November 2002.
  14. Alfawaer,Z. And Al Zoubi,S. , ”A Proposed Security Subsystem for Ad Hoc Networks” International Forum on Computer Science Technology and Applications,IEEE 2009
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Network Nodes Security Attack Malicious Behavior