CFP last date
20 January 2025
Reseach Article

Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks

by G. Indirani, K. Selvakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 19
Year of Publication: 2012
Authors: G. Indirani, K. Selvakumar
10.5120/7915-9258

G. Indirani, K. Selvakumar . Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications. 50, 19 ( July 2012), 1-6. DOI=10.5120/7915-9258

@article{ 10.5120/7915-9258,
author = { G. Indirani, K. Selvakumar },
title = { Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 19 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number19/7915-9258/ },
doi = { 10.5120/7915-9258 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:47.112685+05:30
%A G. Indirani
%A K. Selvakumar
%T Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 19
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MANET). In this technique, the nodes with highest trust value, residual bandwidth and residual energy are selected as active nodes using swarm intelligence based ant colony optimization. Each active node monitors its neighbour nodes and estimates the trust value. If the active node finds any node below a minimum trust threshold, then the node is marked as malicious and an alert message is sent to the source node. When the source node wants to forward the data packet to destination, it discards the malicious nodes in that path and bypasses the data through other nodes in alternate path. It also performs the certificate revocation process for the malicious nodes. By simulation results, we show that the proposed approach reduces overhead.

References
  1. Sevil Sen, and John A. Clark, "A grammatical evolution approach to intrusion detection on mobile ad hoc networks", Proceedings of the second ACM conference on Wireless network security (WiSec '09).
  2. Sureyya Mutlu, and Guray Yilmaz, " A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs", The Seventh International Conference on Networking and Services(ICNS), pp 292 to 298, 2011
  3. Sumitra Menaria, Prof Sharada Valiveti, and Dr K Kotecha, "Comparative study of Distributed Intrusion Detection in Ad-hoc Networks", International Journal of Computer Applications, Volume 8– No. 9, October 2010.
  4. N. Shanthi, Dr. L. Ganesan, and Dr. K. Ramar, " Study of different attacks on multicast mobile ad hoc networks", Journal of Theoretical and Applied Information Technology, 2005-2009
  5. A. K. Rai, R. R. Tewari, and S. K. Upadhyay, "Different Types of Attacks on Integrated MANET-Internet Communication", International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) 265 pp 245-74.
  6. S. Mangai, and A. Tamilarasi, "An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks", Journal of Computer Science. , pp 505-511, 2011.
  7. G. Indirani, and Dr. K. Selvakumar ,"A Swarm Based Efficient Distributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET)"
  8. Quan Jia, Kun Sun, and Angelos Stavrou, " CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET", Proceedings of 20th international conference on computer communications and networks (ICCCN), pp 1 – 6, 2011
  9. Alicherry, M, Keromytis, A. D, Stavrou. A, "Evaluating a collaborative defense architecture for MANETs", IEEE International conference on internet multimedia services architecture and applications (IMSAA), pp 1 – 6, 2009.
  10. S. Venkatasubramanian, and N. P. Gopalan, "A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET", International Journal of Computer Applications (IJCA), pp 7-11, 2011.
  11. HyoJin Kim, Ramachandra Bhargav Chitti, and JooSeok Song,"Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks", Journal of Information Processing Systems, Vol. 7, No. 1, March 2011.
  12. Hwee-Xian Tan, and Winston K. G. Seah, "Framework for Statistical Filtering Against DDoS Attacks in MANETs", 2nd international conference on embedded software and systems, pp 8, 2005.
  13. Venkatesan Balakrishnan, Vijay Varadharajan, and Udaya Kiran Tupakula, "Fellowship: Defense against Flooding and Packet Drop Attacks in MANET", IEEE /IFIP Network Operations and Management Symposium (NOMS), pp 1-4, 2006.
  14. Wei Yu, Yan Sun, and K. J. Ray Liu, "HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks", Proceedings: 24th annual joint conference of the IEEE computer and communications societies (INFOCOM), pp 1252 – 1261, vol. 2, 2005.
  15. Hu, Y-C, Perrig, A. ; Johnson, D. B. , " Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks", 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), pp 1976 - 1986 vol. 3, 2003
  16. Rizwan Khan, and A. K. Vatsa, "Detection and Control of DDOS Attacks over Reputation and Score Based MANET", Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011.
  17. Hai Vu, Ajay Kulkarni, Kamil Sarac, and Neeraj Mittal, " WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks", Proceeding of the Third International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2008
  18. C. W. Chen, "IDMA: improving the defense against malicious attack for ad hoc networks based on ARIP," Proceedings of SPIE Defense and Security Symposium Conference on "Mobile Multimedia/Image Processing, Security, and Applications, March 2008, Orlando, USA
  19. Vinay Rishiwal, S. Verma, and S. K. Bajpai, "QoS Based Power Aware Routing in MANETs", International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009.
  20. Tolba, F. D. Magoni, D. Lorenz, P, "Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks", IEEE Global Telecommunications Conference (GLOBECOM), pp 2786-2790, 2007.
  21. Yaling Yang, and Kravets, R, "Contention-Aware Admission Control for Ad Hoc Networks",IEEE Transactions on mobile computing", pp 363-377, Vol 4, issue 4, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc Networks (MANET) Attacks Swarm Based Detection Defense Technique