Skip to main content
Log in

Malicious node identification using quantitative intrusion detection techniques in MANET

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Due to rapid proliferation of WSN, the application of wireless devices or nodes and usage of mobile computing devices changed the shape of network security. One of the field which need the most security is Mobile Ad hoc Network (MANET). The term ad hoc itself ensures that there is no central entity in order to govern the nodes. The issue of security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. The traditional method of firewall and encryption is not sufficient to protect the network. Therefore an intrusion detection system must be added to the mobile ad hoc network. One of the different kinds of misbehavior a node may exhibit is selfishness. A indiscipline or selfish or node wants to protect own resources when using the services of others and consuming their resources. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we de-scribe different method for detecting indiscipline or malicious nodes in mobile ad hoc network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)

    Google Scholar 

  2. He, B., Joakim, H., Gu, Q.: Security in adhoc networks, An essay produced for the course secure computer systems HT2005 (1DT658) (2005)

  3. IEEE Std. 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997)

  4. Mamatha, G.S., Sharma, S.C.: A robust approach to detect and prevent network layer attacks in MANETS. Int. J. Comput. Sci. Secur. 4(3), 275–284 (2009)

    Google Scholar 

  5. Sundararajan, T.V.P., Shanmugam, A.: Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. Int. J. Comput. Sci. Secur. 3(2), 62–75 (2009)

    Google Scholar 

  6. Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 22, 545–550 (2008)

    Google Scholar 

  7. Dhanalakshmi, S., Rajaram, M.: A reliable and secure framework for detection and isolation of malicious nodes in MANET. Int. J. Comput. Sci. Netw. Secur. 8(10), 184–190 (2008)

    Google Scholar 

  8. Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008)

    Google Scholar 

  9. Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151–1167 (2008)

    Article  Google Scholar 

  10. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31, 708–721 (2008)

    Article  Google Scholar 

  11. Komninos, N., Douligeris, C.: LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7(1), 171–182 (2008)

    Article  Google Scholar 

  12. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H.: AACK: Adaptive acknowledgment intrusion detection for MANET with node detection. In: 24th IEEE International Conference on Enhancement, Advanced Information Networking and Applications (AINA) (2010)

  13. Mohammed, M.N., Sulaiman, N.: Intrusion detection system based on SVM for WLAN. Procedia Technol. 1, 313–317 (2012)

    Article  Google Scholar 

  14. Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)

    Article  Google Scholar 

  15. Duhan, S., Khandnor, P.: Intrusion detection system in wireless sensor networks: a comprehensive review. In: Electrical, Electronics, and Optimization Techniques in IEEE, pp. 2707–2713 (2016)

  16. Basabaa, A., Sheltami, T., Shakshuki, E.: Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Comput. Sci. 32, 571–578 (2014)

    Article  Google Scholar 

  17. Pattanayak, B.K., Rath, M.: A mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10(6), 970–975 (2014)

    Article  Google Scholar 

  18. Choi, S., Kim, D., Lee, D., Jung, J.: International Conference on Sensor Networks, Ubiquitous, and Trust-worthy Computing, pp. 343–348 (2008)

  19. Song, N., Qian, L., Li, X.: 19th IEEE International Parallel and Distributed Processing Symposium (2005)

  20. Mutlu, S., Yilmaz, G.: A distributed cooperative trust based intrusion detection framework for MANETs. In: The Seventh International Conference on Networking and Services (2011)

  21. Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking computing, pp. 146–155. ACM, Long Beach, CA (2001)

  22. Mitchell, R., Chen, R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)

    Article  Google Scholar 

  23. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  24. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28(1), 18–28 (2009)

    Article  Google Scholar 

  25. Li, G., He, J., Fu, Y.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18), 4324–4332 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Arul Selvan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arul Selvan, M., Selvakumar, S. Malicious node identification using quantitative intrusion detection techniques in MANET. Cluster Comput 22 (Suppl 3), 7069–7077 (2019). https://doi.org/10.1007/s10586-018-2418-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2418-2

Keywords

Navigation