Skip to main content
Log in

Malicious node analysis in MANETS

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the intermediate nodes play an role of routers to pass data packets to destination. The Routing protocols are playing very vital role in effectiveness of MANETS due to mobility and dynamically changing of topology. Due to the nature of broadcast wireless medium and not have central control now many routing protocols are vulnerable to attacks. These attacks are black hole attack, greyhole attack, sinkhole attack, byzantine attack, sleep deprivation attack and wormhole attack. The paper is discussing all these attacks. From these routing protocols, one of protocol is ad hoc on-demand distance vector routing (AODV). It is a very trendy routing protocol and it is very susceptible to black hole attacks. In black hole attack a mobile node mistakenly publicize the route and sinks data packets to incorrect destination instead of sending to accurate destination. It analyzes the related work and position a solution based on analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: 2003 International conference on wireless networks (ICWN 03), Las Vegas, Nevada, USA

  2. Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346

    Google Scholar 

  3. Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Netw 3(5):13–20

    Google Scholar 

  4. Weerasinghe H, Fu H (2008) Prevention of co-operative black hole attack in MANET: simulation implementation and evaluation. Int J Softw Eng Appl 2(3)

  5. Su MY, Chiang K-L, Liao W-C (2010) Mitigation of black hole attack nodes in mobile ad hoc network. In: International symposium on parallel and distributed processing with application. IEEE Conference, Taipei, Taiwan

  6. Gupta S, Kar S, Daramraja S (2011) BAAP: black hole attack avoidance protocol for wireless sensor network. In: 2nd International conference on computer and communication technology (ICCCT), IEEE,  Allahabad, India

  7. Jhaveri RH, Patel SJ, Jinwala DC (2012) A novel approach for gray hole attack and black hole attacks in mobile Ad hoc networks. In: 2nd international on advanced computer and communication technologies (ACCT), IEEE, Rohtak, Haryana, India

  8. Chatterje N, Mandal JK (2013) Detection of black hole behavior using triangular encryption in NS2. In: 1st international conference on computational intelligence: modeling techniques and applications (CIMTA), Procedia Technology Elsevier, pp 524–529

  9. Tan S, Kim K (2013) Secure route discovery for preventing black hole attacks on AODV based MANETS. ICT Convergence (ICTC). In: 2013 International conference, Jeju

  10. Perkins CE, Royer EM (1999) Ad hoc on demand distance vector routing, mobile computing system and applications. In: Second IEEE workshop on mobile computing systems and applications, WMCSA IEEE, New Orleans, USA

  11. Jamal T, Butt SA (2017) Low-energy adaptive clustering hierarchy (LEACH) enhancement for military security operations. J Basic Appl Sci Res 7(5):12–17 (ISSN 2090-4304)

    Google Scholar 

  12. Jamal T, Alam M, Umair MM (2017) Detection and prevention against RTS attacks in wireless LANs. In: International conference on communication, computing and digital systems (C-CODE), IEEE, Islamabad, Pakistan

  13. Jamal T, Mendes P (2014) Cooperative relaying in user-centric networking under interference conditions. In: IEEE communications magazine, vol. 52, no. 12, pp. 18–24. https://doi.org/10.1109/MCOM.2014.6979947

    Article  Google Scholar 

  14. Makwana S, Vaghela K (2015) Detection and elimination of gray hole attack using dynamic credit based technique in MANET. Int J Comput Appl 125(4):975–8887

    Google Scholar 

  15. Sharma R (2016) Gray-hole attack in mobile ad hoc networks: a survey. IJCSIT 7

  16. Gandhewar N, Patel R (2012) Detection & prevention of sinkhole attack on AODV protocol in mobile adhoc network. In: Fourth international conference on computational intelligence and communication networks, IEEE, Mathura, India

  17. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1:293–315

    Article  Google Scholar 

  18. Jhaveriand RH, Patel AD (2010) MANET routing protocols and wormhole attack against AODV. IJCSNS Int J Comput Sci Netw Secur 10(4):12–18

    Google Scholar 

  19. Geetha A, Sreenath N (2016) Byzantine attacks and its security measures in mobile adhoc networks. Int J Comput Commun Instrum Engg (IJCCIE) 3(1)

  20. Sarkar M, Roy DB (2011) Prevention of sleep deprivation attacks using clustering. In: 3rd international conference on  electronics computer technology (ICECT), IEEE, Kanyakumari, India

  21. Pirretti M, Zhu S (2006) The sleep deprivation attack in sensor networks: analysis and methods of defense. Int J Distrib Sens Netw SAGE 2:267–287

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shariq Aziz Butt.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamal, T., Butt, S.A. Malicious node analysis in MANETS. Int. j. inf. tecnol. 11, 859–867 (2019). https://doi.org/10.1007/s41870-018-0168-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0168-2

Keywords

Navigation