Anomaly Detection System in a Cluster Based MANET

  • Vikram NarayandasEmail author
  • Sujanavan Tiruvayipati
  • Madusu Hanmandlu
  • Lakshmi Thimmareddy
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


This chapter presents the development of anomaly detection system (ADS) for locating a malicious node in a cluster based Manet. ADS makes use of AODV protocol that performs route discovery and data forwarding. Each node responds to root request (RREQ) messages and sends root reply (RREP) messages back to the source node. In a cluster based topology a threshold is applied to see if this root reply number is more than the threshold value. If so the node is malicious. Then each node sends an alert to the cluster head (CH) and its neighboring nodes. The proposed ADS avoids the routing to a malicious node thereby preventing high energy consumption of the associated nodes and safeguarding the data transfer in the Manet.


Manet ADS Cluster head AODV Energy discharge 


  1. 1.
    Y. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless ad hoc networks”, Proc. INFOCOM’ 03, IEEE, San Francisco, CA, April 2003, pp. 1976–1986.Google Scholar
  2. 2.
    L. Zhou, Z. J. Haas, “Securing ad hoc networks”, IEEE Network, Nov/Dec 1999, pp 24–30.Google Scholar
  3. 3.
    H. Deng, R. Xu, J. Li, F. Zhang, R. Levy, W. Lee, “Agent based Cooperative Anomaly Detection for Wireless Ad Hoc Networks,” in Proc. the IEEE Twelfth International Conference on Parallel and Distributed Systems (ICPDS’06),2006.Google Scholar
  4. 4.
    C. Perkins, E. Belding-Royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, Jul. 2003. IETF RFC 3561.Google Scholar
  5. 5.
    Liy.weij “Guidelines on selecting intrusion detection method in manet” 2004.Google Scholar
  6. 6.
    M. Hollick, J. Schmitt, C. Seipl, and R. Steinmetz,“On the effect of node misbehavior in ad hoc networks,” in Proc. IEEE Global Telecommun. Conf. GLOBECOM, Jun. 2004, pp. 3759–3763.Google Scholar
  7. 7.
    A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad hoc networks,” IEEE Wireless Commun., vol. 11, no. 1, pp. 48–60, Feb. 2004.Google Scholar
  8. 8.
    Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks”, Proc. MOBICOM 2000, Boston, ACM press, pp: 275–283, 2000.Google Scholar
  9. 9.
    Fu, Yingfang; He, Jingsha; Li, Guorui, “A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks”, IEEE Computer Software and Applications Conference, 2007. COMPSAC 2007 - Vol. 2. 31st Annual International Volume 2, Issue, 24–27 July 2007 Page(s):75–80.Google Scholar
  10. 10.
    B. Sun, K. Wu and U. Pooch, “Alert Aggregation in Mobile Ad-Hoc Networks” ACM Wireless security (WISE.03), SanDeigo, CA, pp. 69–7.Google Scholar
  11. 11.
    ZaputeN “securing adhoc routing protocols” in ACM workshop on wiress security, USA 2002.Google Scholar
  12. 12.
    Eskin. E, Portray L “A Geometric framework for unsupervised anomaly detection intrusins in unlabelled data” in 2002.Google Scholar
  13. 13.
    Kimay sanzgiri, Daniel laflamne bridget dahil, clay shields and Elzabeth belding Royer “Authentication routing for adhoc networks” IEEE journal on selected areas in communications, vol 23, March 2005Google Scholar
  14. 14.
    C. Perkins, E. Belding-Royer, and S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, Jul. 2003. IETF RFC 3561 (Experimental).Google Scholar
  15. 15.
    M. Zapata, Secure ad hoc on-demand distance vector (SAODV) routing, Sep. 2006. IETF Internet Draft, draft-guerrero-manet-saodv-06.txt.Google Scholar
  16. 16.
    Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto, and Nei Kato, “A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks” IEEE Transaction on Vehicular Technology, vol. 58, NO. 5, June 2009.Google Scholar
  17. 17.
    Y. Huang, W. Fan, W. Lee, and P. Yu, “Cross-feature analysis for detecting ad-hoc routing anomalies,” in Proc. 23rd ICDCS, May 2003, pp. 478–487.Google Scholar
  18. 18.
    Y. Huang and W. Lee, “Attack analysis and detection for ad hoc routing protocols,” in Proc. 7th Int. Symp. RAID, Sep. 2004, pp. 125–145.Google Scholar
  19. 19.
    Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto “A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks” IEEE Trans. On Vehicluar Technology, Vol. 58, No. 5, June 2009.Google Scholar
  20. 20.
    P. Ning and K. Sun, “How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols,” in Proc. 4th Annu. IEEE Inf. Assurance Workshop, Jun. 2003.Google Scholar
  21. 21.
    Y. Waizumi, Y. Sato, and Y. Nemoto, “A network-based anomaly detection system using multiple network features,” in Proc. 3rd Int. Conf. WEBIST, Mar. 2007, pp. 410–413.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Vikram Narayandas
    • 1
    Email author
  • Sujanavan Tiruvayipati
    • 1
  • Madusu Hanmandlu
    • 1
  • Lakshmi Thimmareddy
    • 1
  1. 1.Department of Computer Science & EngineeringMVSR Engineering CollegeHyderabadIndia

Personalised recommendations