Abstract
Mobile Ad hoc Network is a collection of self-organizing mobile nodes that can communicate either directly or indirectly. The open medium and wide distribution of nodes make MANET highly vulnerable to different kinds of attacks. Most of the common routing protocols assume that all participating nodes are well behaving. The presence of malicious nodes cannot be neglected as it affects the network resources like bandwidth, throughput, transmission delay, etc. and packet transmission adversely. This paper presents an acknowledgement based routing scheme that detects selfish nodes. The observations shows that the system behaves well when compared with the most commonly used routing protocol AODV in terms of packet drops, throughput, PDR and normalized routing overhead.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Singh, G., Singh, J.: MANET: issues and behaviour analysis of routing protocols. In: International Journal of Advanced Research in Computer Science and Software Engineering, Feb 2004
Ju, H.J., Rubin, I., Kuan, Y.C.: An adaptive RTS/CTS control mechanism for IEEE 802.11 MAC protocol. In: National Science Foundations (2002)
Nagar, N., Biagioni, E.S.: Open issues in routing techniques in Ad Hoc wireless sensor networks. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, vol. 4 (2002)
Suri, A., Iyengar, S.S., Cho, E.: Ecoinformatics using wireless sensor networks: an overview. In: Proceedings of the Ecological Informatics, Elsevier (2006)
Biagioni, E., Bridges, K., Chee, B.J.S.: PODS: a remote ecological Micro sensor network. http://www.botany.hawaii.edu/pods/overview.htm
Mueller, S., Tsang, R.P., Ghosal, D.: Multipath routing in mobile Ad Hoc networks: issues and challenges. In: Performance Tools and Applications to Networked systems, Lecture Notes in Computer Science, Springer (2004)
Shrivastava, S., Jain, S.: A brief introduction of different type of security attacks found in mobile Ad-hoc network. In: ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9(5), Sep 2003
Kandah, F., Singh, Y., Wang, C.: Colluding Injected attack in mobile Ad-hoc networks. In: IEEE INFOCOM 2011 Workshop on M2MCN-2011 (2011)
Tiranuch, A., Wu, J.: A survey on intrusion detection in mobile Ad hoc networks. In: Proceedings of the Wireless/Mobile Network Security, Springer (2006)
Hu, Y., Johnson, D., Perrig, A.: SEAD secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceeding of the 4th IEEE Workshop Mobile Computing Systems and Applications, p. 313 (2002)
Lai, W.-S., Lin, C.-H., Liu, J.-C., Huang, Y.-L., Chou, M.-C.: I-SEAD: a secure routing protocol for mobile Ad hoc networks. In: International Journal of Multimedia Ubiquitous Engineering, vol. 3(4) Oct 2008
Santhi, K., Bakeyalakshmi, P.: Principal component analysis in routing to identify the intrusion by sequential hypothesis testing. In: International Journal of Engineering and Science ISBN: 2319-6483, ISSN: 2278-4721, vol. 1(8), pp. 13-19, Nov 2012
Abdalla, A.M., Almazeed, A.H., Dr. Zewail, A.: Detection and isolation of packet dropping attacker in MANETs. In: International Journal of Advanced Computer Science and Applications, vol. 4(4) (2013)
Kalman, G., Parag, M., Matthias, H., Ralf, S.: Detection of colluding misbehaving nodes in mobile Ad hoc and wireless mesh networks. In: IEEE Global Communication conference 2007, Nov 2007
Hu, Y., Perrig, A., Johnson, D.: ARIADNE: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing, pp. 12–23. Atlanta, GA (2002)
Kang, N., Shakshuki, E., Sheltami, T.: EAACK-A Secure intrusion-detection system for MANETs. In: IEEE Journal on selected areas in communications, vol. 30(2), Feb 2013
Hoebeke, J., Moerman, I., Dhoedt, B., Demeester, P.: An overview of mobile Ad hoc networks: applications and challenges. In: Department of Infor-mation Technology (INTEC), Ghent University IMEC vzw (2005)
Jayakumar, J.G., Gopinath, G.: Ad hoc mobile wireless networks rout-ing protocol a review. J. Comput. Sci. 3(8), 574–582 (2007)
Perkins, C.E., Royer, .: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2th IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100. New Orleans, LA, Feb 1999
Lundberg, J.: Routing security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, HUT TML (2000)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless Ad hoc network. In: IEEE Communications Magzine, vol. 40(10) (2002)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS 2002), Jan (2002)
Karpijoki, V.: Security in ad hoc networks. In: Proceedings of the Helsinki University of Technology, Seminars on Network Security (2000)
Mistry, N., Jinwala, D.C., IAENG, M., Zaveri, M.: Improving AODV protocol against black hole attacks. In: IMECS2010 (2010)
Kannan, S., Kalaikumaran, T., Karthik, S., Arunachalam, V.P.: A review on attack prevention methods in MANET. J. Mod. Math. Stat. 5(1), 37–42 (2011)
NS-2.35 simulator. http://nsnam.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Sreelakshmi, S., Preetha, K.G. (2016). Request Reply Detection Mechanism for Malicious MANETs. In: Snášel, V., Abraham, A., Krömer, P., Pant, M., Muda, A. (eds) Innovations in Bio-Inspired Computing and Applications. Advances in Intelligent Systems and Computing, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-28031-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-28031-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28030-1
Online ISBN: 978-3-319-28031-8
eBook Packages: EngineeringEngineering (R0)