CFP last date
20 January 2025
Reseach Article

Impact of Malicious Node in MANETs

Published on August 2013 by Anshu Chaturvedi
International Conference on Reliability, Infocom Technology and Optimization
Foundation of Computer Science USA
ICRITO - Number 1
August 2013
Authors: Anshu Chaturvedi
d3f1ab60-9971-4e36-8a2c-684f38bf342b

Anshu Chaturvedi . Impact of Malicious Node in MANETs. International Conference on Reliability, Infocom Technology and Optimization. ICRITO, 1 (August 2013), 41-44.

@article{
author = { Anshu Chaturvedi },
title = { Impact of Malicious Node in MANETs },
journal = { International Conference on Reliability, Infocom Technology and Optimization },
issue_date = { August 2013 },
volume = { ICRITO },
number = { 1 },
month = { August },
year = { 2013 },
issn = 0975-8887,
pages = { 41-44 },
numpages = 4,
url = { /specialissues/icrito/number1/13054-1307/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Reliability, Infocom Technology and Optimization
%A Anshu Chaturvedi
%T Impact of Malicious Node in MANETs
%J International Conference on Reliability, Infocom Technology and Optimization
%@ 0975-8887
%V ICRITO
%N 1
%P 41-44
%D 2013
%I International Journal of Computer Applications
Abstract

MANETs are known to possess unique and many vulnerable features. In such a case, security is again another crucial issue to be tackled. The attacks can affect the performance of the network critically. This paper therefore proposes a solution for maintain the optimum performance of the network even in presence of malicious nodes by modifying the existing DSR protocol. The simulation is performed in NS-2. The results of the scheme show that the network performance is not affected and proposed solution handles it well.

References
  1. L. Zhou, Z. J. Haas, Cornell Univ. , "Securing ad hoc networks," IEEE Network, Nov/Dec 1999, Volume: 13, Page(s): 24-30, ISSN: 0890-8044
  2. J. -P. HuBaux, L. Buttyan, and S. Capkun. , "The quest for security immobile ad hoc network," In Proc. ACM MOBICOM, Oct. 2001.
  3. J. Kong et al. , "Providing robust and ubiquitous security support for mobile ad-hoc networks," In Proc. IEEE ICNP, pages 251–260, 2001
  4. S. Yi, P. Naldurg and R. Kravets, "Security-Aware Ad Hoc Routing for Wireless Networks", In Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001.
  5. H. Deng, W. Li, Agrawal, D. P. , "Routing security in wireless ad hoc networks," Cincinnati Univ. , OH,USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804
  6. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume- 11, Page(s): 38- 47, ISSN: 1536-1284
  7. Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009.
  8. Orda, A. and Libman, N. The designers' perspective to atomic noncooperative networks. IEEE/ACM Transactions on Networks, 7(6) pp. 875-884, 1999.
  9. Qiu, L. Yang, Y. R. Zhang, Y. and Shenker, S. On selfish Routing in internet like environments. In Proceedings of ACM SIGCOMM'03, Aug 2003.
  10. Roughgarden, T. The price of anarchy is independent of the network topology. In Proceedings of the 34th Annual ACM Symposium on the Theory of Computing, 2002.
  11. Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Adhoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  12. Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, "A secure Routing Protocol for Ad hoc networks", In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP' 02), pp. 78-87, November 2002.
  13. Alfawaer,Z. And Al Zoubi,S. , "A Proposed Security Subsystem for Ad Hoc Networks" International Forum on Computer Science Technology and Applications, IEEE 2009. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  14. Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Adhoc Network Security Malicious Throughput Performance