Advertisement

Cluster Computing

, Volume 22, Supplement 3, pp 7069–7077 | Cite as

Malicious node identification using quantitative intrusion detection techniques in MANET

  • M. Arul SelvanEmail author
  • S. Selvakumar
Article
  • 128 Downloads

Abstract

Due to rapid proliferation of WSN, the application of wireless devices or nodes and usage of mobile computing devices changed the shape of network security. One of the field which need the most security is Mobile Ad hoc Network (MANET). The term ad hoc itself ensures that there is no central entity in order to govern the nodes. The issue of security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. The traditional method of firewall and encryption is not sufficient to protect the network. Therefore an intrusion detection system must be added to the mobile ad hoc network. One of the different kinds of misbehavior a node may exhibit is selfishness. A indiscipline or selfish or node wants to protect own resources when using the services of others and consuming their resources. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we de-scribe different method for detecting indiscipline or malicious nodes in mobile ad hoc network.

Keywords

MANET Malicious nodes Intrusion Proliferation 

References

  1. 1.
    Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)Google Scholar
  2. 2.
    He, B., Joakim, H., Gu, Q.: Security in adhoc networks, An essay produced for the course secure computer systems HT2005 (1DT658) (2005)Google Scholar
  3. 3.
    IEEE Std. 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997)Google Scholar
  4. 4.
    Mamatha, G.S., Sharma, S.C.: A robust approach to detect and prevent network layer attacks in MANETS. Int. J. Comput. Sci. Secur. 4(3), 275–284 (2009)Google Scholar
  5. 5.
    Sundararajan, T.V.P., Shanmugam, A.: Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. Int. J. Comput. Sci. Secur. 3(2), 62–75 (2009)Google Scholar
  6. 6.
    Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 22, 545–550 (2008)Google Scholar
  7. 7.
    Dhanalakshmi, S., Rajaram, M.: A reliable and secure framework for detection and isolation of malicious nodes in MANET. Int. J. Comput. Sci. Netw. Secur. 8(10), 184–190 (2008)Google Scholar
  8. 8.
    Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008)Google Scholar
  9. 9.
    Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151–1167 (2008)Google Scholar
  10. 10.
    Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31, 708–721 (2008)Google Scholar
  11. 11.
    Komninos, N., Douligeris, C.: LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7(1), 171–182 (2008)Google Scholar
  12. 12.
    Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H.: AACK: Adaptive acknowledgment intrusion detection for MANET with node detection. In: 24th IEEE International Conference on Enhancement, Advanced Information Networking and Applications (AINA) (2010)Google Scholar
  13. 13.
    Mohammed, M.N., Sulaiman, N.: Intrusion detection system based on SVM for WLAN. Procedia Technol. 1, 313–317 (2012)Google Scholar
  14. 14.
    Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)Google Scholar
  15. 15.
    Duhan, S., Khandnor, P.: Intrusion detection system in wireless sensor networks: a comprehensive review. In: Electrical, Electronics, and Optimization Techniques in IEEE, pp. 2707–2713 (2016)Google Scholar
  16. 16.
    Basabaa, A., Sheltami, T., Shakshuki, E.: Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Comput. Sci. 32, 571–578 (2014)Google Scholar
  17. 17.
    Pattanayak, B.K., Rath, M.: A mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10(6), 970–975 (2014)Google Scholar
  18. 18.
    Choi, S., Kim, D., Lee, D., Jung, J.: International Conference on Sensor Networks, Ubiquitous, and Trust-worthy Computing, pp. 343–348 (2008)Google Scholar
  19. 19.
    Song, N., Qian, L., Li, X.: 19th IEEE International Parallel and Distributed Processing Symposium (2005)Google Scholar
  20. 20.
    Mutlu, S., Yilmaz, G.: A distributed cooperative trust based intrusion detection framework for MANETs. In: The Seventh International Conference on Networking and Services (2011)Google Scholar
  21. 21.
    Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking computing, pp. 146–155. ACM, Long Beach, CA (2001)Google Scholar
  22. 22.
    Mitchell, R., Chen, R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)Google Scholar
  23. 23.
    Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)Google Scholar
  24. 24.
    Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28(1), 18–28 (2009)Google Scholar
  25. 25.
    Li, G., He, J., Fu, Y.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18), 4324–4332 (2008)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Bharath Institute of Higher Education and ResearchChennaiIndia
  2. 2.Department of Computer Science & EngineeringG.K.M. College of Engineering & TechnologyChennaiIndia

Personalised recommendations