Mobile Ad hoc Network
(MANET) is a significant concept of wireless networks which comprises of
thousands of nodes that are mobile as well as autonomous and they do not
requires any existing network infrastructure. The autonomous nodes can freely
and randomly move within the network which can create temporary dynamic network
and these networks can change their topology frequently. The security is the
primary issue in MANET which degrades the network performance significantly. In
this paper, cluster based malicious node detection methodology is proposed to
detect and remove the malicious nodes. Each node within the cluster gets the
cluster key from the cluster head and this key is used for the data transaction
between cluster head and node. The cluster head checks this key for every data
transaction from node and match with their cluster table. If match is valid,
and then only it will recognize that this node is belongs to this cluster,
otherwise it is decided as malicious node. This paper also discusses the
detection of link failure due to the presence of malicious node by determining
the gain of each link in the network. The performance of the proposed method is
analyzed using packet delivery ratio, network life time, and throughput and
energy consumption. The proposed malicious node detection system is compared
with the conventional techniques as OEERP (Optimized energy efficient routing
protocol), LEACH (Low energy adaptive clustering hierarchy), DRINA (Data
routing for In-network aggregation) and BCDCP (Base station controlled dynamic
clustering protocol).
References
[1]
Nguyen, H.L. and Nguyen, U.T. (2008) A Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks. Ad Hoc Networks, 6, 32-46. http://dx.doi.org/10.1016/j.adhoc.2006.07.005
[2]
Karmore, P. and Bodkhe, S. (2011) A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, Chennai.
[3]
Rai, A.K., Tewari, R.R. and Upadhyay, S.K. (2010) Different Types of Attacks on Integrated MANET. Internet Communication. International Journal of Computer Science and Security, 4.
[4]
Chand, K.K., Bharati, P.V. and Ramanjaneyulu, B.S. (2012) Optimized Energy Efficient Routing Protocol for Life- Time Improvement in Wireless Sensor Networks. Proc. Int. Conf. Adv. Eng., Sci. Manage. (ICAESM), 345-349.
[5]
Singh, S.K., Singh, M.P. and Singh, D.K. (2010) Routing Protocols in Wireless Sensor Networks—A Survey. International Journal of Computer Science and Engineering Survey, 1, 63-83. http://dx.doi.org/10.5121/ijcses.2010.1206
[6]
Abidoye, A.P., Azeez, N.A., Adesina, A.O. and Agbele, K.K. (2011) ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks. Wireless Sensor Networks, 3, 307-312. http://dx.doi.org/10.4236/wsn.2011.39032
[7]
Chatterjee, S. and Singh, M. (2012) A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks. International Journal of Advanced Networking and Applications, 3, 12-18.
[8]
Rejina Parvin, J. and Vasanthanayaki, C. (2015) Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks. IEEE Sensors Journal, 15.
[9]
Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C. and Lai, C.F. (2015) Defending against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Systems Journal, 9.
[10]
Baadache, A. and Belmehdi, A. (2010) Avoiding Blackhole and Cooperative Blackhole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security, 7.
[11]
Vishnu, K. and Paul, A.J. (2010) Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile Ad Hoc Networks. International Journal of Computer Applications, 1, 28-32.
[12]
Liu, K., Pramod, D., Varshney, K. and Balakrishnan, K. (2007) An Acknowledgement Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536-550. http://dx.doi.org/10.1109/TMC.2007.1036
[13]
Deng, S., Li, J. and Shen, L. (2011) Mobility-Based Clustering Protocol for Wireless Sensor Networks with Mobile Nodes. IET Wireless Sensor Systems, 1, 39-47. http://dx.doi.org/10.1049/iet-wss.2010.0084
[14]
Weerasinghe, H. and Fu, H. (2007) Preventing Cooperative Blackhole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Proceedings of IEEE ICC, 362-367.
[15]
Xue, Y. and Nahrstedt, K. (2004) Providing Fault-Tolerant Ad Hoc Routing Service in Adversarial Environments. Wireless Personal Communications, 29, 367-388. http://dx.doi.org/10.1023/B:WIRE.0000047071.75971.cd