Skip to main content

Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks

  • Conference paper
  • First Online:
Book cover Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 404))

Abstract

Lack of association among the nodes, mobility, device heterogeneity, bandwidth, multihop and battery power constraints in ad hoc wireless networks make the design of efficient routing protocols a major challenge. MANET is more susceptible to be attacked than wired network. Encryption, cryptography and authentication are the preventive measures that may be used at the initial level for sinking the attack possibilities, but these techniques are not capable to protect a network from newer attacks. Considering the parameters like bandwidth, energy, security, etc. many routing protocols categorized as reactive, proactive and hybrid have been proposed for communications; still an efficient communication and the dropping of packets are the major issues in MANET that need to be focused. Moreover, possibility of dropping a packet during transmission by malicious node cannot be ignored. In this paper, we have presented a practical approach for cluster head election and the possible probabilities. Issues with the packet dropping at localized level and maintaining the stability of the nodes have been explored. We also present a malicious node detection method. Preliminary simulation results have shown that proposed system reduces the impact of sequence number attack and packet dropping attack to very high extend.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perkins, C.E.: Ad hoc Networking, pp. 198–264. Addison-Wesley, New York (2001)

    Google Scholar 

  2. Gupta, S.S., Ray, S.S., Mistry, O., Naskar, M.K.: A stochastic approach for topology management of mobile ad hoc networks. In: Asian International Mobile Computing Conference, pp. 90–99. Jadavpur University, Kolkata (2007)

    Google Scholar 

  3. Perkins, C.E., Royer, E.M., Das S.R.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing and Applications, vol. 3, pp. 99–100. New Orleans, LA, USA (1999)

    Google Scholar 

  4. Johnson, D., Maltz, D.: In: Imielinski, T., Korth, H. (eds.) Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing. Kluwer (1996)

    Google Scholar 

  5. IEEE Std. 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1997)

    Google Scholar 

  6. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L., Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47, UCLA Computer Science Department (2004)

    Google Scholar 

  7. IEEE 802.11: Wireless LAN Media Access Control (MAC) and Physical layer (PHY) Specifications. ANSI/EIEEE Std. 802.11 (1999)

    Google Scholar 

  8. Djahel, S., Nait-abdesselam, F., Zhang, Z.: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun. Surv. Tutor. 13, Fourth Quarter (2011)

    Google Scholar 

  9. Duarte-Melo, E.J., Liu, M.: Energy efficiency of many-to-one communication in wireless networks. In: Invited Paper in Proceeding of IEEE 45th Midwest Symposium on Circuits and Systems (MWSCAS’02), Volume 1,Tulsa (2002)

    Google Scholar 

  10. Murthy, S.R., Manoj, B.S.: Ad hoc Mobile Wireless Networks—Architectures and Protocols. Pearson Publication, New York (2014)

    Google Scholar 

  11. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, New York, NY, USA: ACM Press, pp. 255–265. Boston, MA (2000)

    Google Scholar 

  12. Wang, D.: Malicious node detection mechanism for wireless ad hoc network. Int. J. Secur. (IJS) 7(1) (2013), School of Mathematical Sciences, Chuzhou University, China

    Google Scholar 

  13. Mishra, A., Nadkarni, K., Patcha, A., Virginia Tech: Intrusion detection in wireless ad hoc networks. IEEE Wirel. Commun. (2004)

    Google Scholar 

  14. Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. College of Computing, Georgia Institute of Technology

    Google Scholar 

  15. Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad hoc Mobile Wireless Networks- Principles, Protocols and Applications, pp. 267–270. Auerbach Publications, Taylor & Francis Group, Boca Raton (2012)

    Google Scholar 

  16. Dey, S.: Graph Theory with Applications, pp. 5–30. SPD (2012)

    Google Scholar 

  17. Krawetz, N.: Introduction to Network Security, pp. 5–13. Thomson Learning, Boston (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shrikant V. Sonekar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Sonekar, S.V., Kshirsagar, M.M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2695-6_27

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2693-2

  • Online ISBN: 978-81-322-2695-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics