Skip to main content

Request Reply Detection Mechanism for Malicious MANETs

  • Conference paper
  • First Online:
  • 942 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 424))

Abstract

Mobile Ad hoc Network is a collection of self-organizing mobile nodes that can communicate either directly or indirectly. The open medium and wide distribution of nodes make MANET highly vulnerable to different kinds of attacks. Most of the common routing protocols assume that all participating nodes are well behaving. The presence of malicious nodes cannot be neglected as it affects the network resources like bandwidth, throughput, transmission delay, etc. and packet transmission adversely. This paper presents an acknowledgement based routing scheme that detects selfish nodes. The observations shows that the system behaves well when compared with the most commonly used routing protocol AODV in terms of packet drops, throughput, PDR and normalized routing overhead.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Singh, G., Singh, J.: MANET: issues and behaviour analysis of routing protocols. In: International Journal of Advanced Research in Computer Science and Software Engineering, Feb 2004

    Google Scholar 

  2. Ju, H.J., Rubin, I., Kuan, Y.C.: An adaptive RTS/CTS control mechanism for IEEE 802.11 MAC protocol. In: National Science Foundations (2002)

    Google Scholar 

  3. Nagar, N., Biagioni, E.S.: Open issues in routing techniques in Ad Hoc wireless sensor networks. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, vol. 4 (2002)

    Google Scholar 

  4. Suri, A., Iyengar, S.S., Cho, E.: Ecoinformatics using wireless sensor networks: an overview. In: Proceedings of the Ecological Informatics, Elsevier (2006)

    Google Scholar 

  5. Biagioni, E., Bridges, K., Chee, B.J.S.: PODS: a remote ecological Micro sensor network. http://www.botany.hawaii.edu/pods/overview.htm

  6. Mueller, S., Tsang, R.P., Ghosal, D.: Multipath routing in mobile Ad Hoc networks: issues and challenges. In: Performance Tools and Applications to Networked systems, Lecture Notes in Computer Science, Springer (2004)

    Google Scholar 

  7. Shrivastava, S., Jain, S.: A brief introduction of different type of security attacks found in mobile Ad-hoc network. In: ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9(5), Sep 2003

    Google Scholar 

  8. Kandah, F., Singh, Y., Wang, C.: Colluding Injected attack in mobile Ad-hoc networks. In: IEEE INFOCOM 2011 Workshop on M2MCN-2011 (2011)

    Google Scholar 

  9. Tiranuch, A., Wu, J.: A survey on intrusion detection in mobile Ad hoc networks. In: Proceedings of the Wireless/Mobile Network Security, Springer (2006)

    Google Scholar 

  10. Hu, Y., Johnson, D., Perrig, A.: SEAD secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceeding of the 4th IEEE Workshop Mobile Computing Systems and Applications, p. 313 (2002)

    Google Scholar 

  11. Lai, W.-S., Lin, C.-H., Liu, J.-C., Huang, Y.-L., Chou, M.-C.: I-SEAD: a secure routing protocol for mobile Ad hoc networks. In: International Journal of Multimedia Ubiquitous Engineering, vol. 3(4) Oct 2008

    Google Scholar 

  12. Santhi, K., Bakeyalakshmi, P.: Principal component analysis in routing to identify the intrusion by sequential hypothesis testing. In: International Journal of Engineering and Science ISBN: 2319-6483, ISSN: 2278-4721, vol. 1(8), pp. 13-19, Nov 2012

    Google Scholar 

  13. Abdalla, A.M., Almazeed, A.H., Dr. Zewail, A.: Detection and isolation of packet dropping attacker in MANETs. In: International Journal of Advanced Computer Science and Applications, vol. 4(4) (2013)

    Google Scholar 

  14. Kalman, G., Parag, M., Matthias, H., Ralf, S.: Detection of colluding misbehaving nodes in mobile Ad hoc and wireless mesh networks. In: IEEE Global Communication conference 2007, Nov 2007

    Google Scholar 

  15. Hu, Y., Perrig, A., Johnson, D.: ARIADNE: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing, pp. 12–23. Atlanta, GA (2002)

    Google Scholar 

  16. Kang, N., Shakshuki, E., Sheltami, T.: EAACK-A Secure intrusion-detection system for MANETs. In: IEEE Journal on selected areas in communications, vol. 30(2), Feb 2013

    Google Scholar 

  17. Hoebeke, J., Moerman, I., Dhoedt, B., Demeester, P.: An overview of mobile Ad hoc networks: applications and challenges. In: Department of Infor-mation Technology (INTEC), Ghent University IMEC vzw (2005)

    Google Scholar 

  18. Jayakumar, J.G., Gopinath, G.: Ad hoc mobile wireless networks rout-ing protocol a review. J. Comput. Sci. 3(8), 574–582 (2007)

    Article  Google Scholar 

  19. Perkins, C.E., Royer, .: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2th IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100. New Orleans, LA, Feb 1999

    Google Scholar 

  20. Lundberg, J.: Routing security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, HUT TML (2000)

    Google Scholar 

  21. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless Ad hoc network. In: IEEE Communications Magzine, vol. 40(10) (2002)

    Google Scholar 

  22. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS 2002), Jan (2002)

    Google Scholar 

  23. Karpijoki, V.: Security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, Seminars on Network Security (2000)

    Google Scholar 

  24. Mistry, N., Jinwala, D.C., IAENG, M., Zaveri, M.: Improving AODV protocol against black hole attacks. In: IMECS2010 (2010)

    Google Scholar 

  25. Kannan, S., Kalaikumaran, T., Karthik, S., Arunachalam, V.P.: A review on attack prevention methods in MANET. J. Mod. Math. Stat. 5(1), 37–42 (2011)

    Article  Google Scholar 

  26. NS-2.35 simulator. http://nsnam.org/

  27. http://ns2tutor.weebly.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sreelakshmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sreelakshmi, S., Preetha, K.G. (2016). Request Reply Detection Mechanism for Malicious MANETs. In: Snášel, V., Abraham, A., Krömer, P., Pant, M., Muda, A. (eds) Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-28031-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28031-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28030-1

  • Online ISBN: 978-3-319-28031-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics