Abstract
Lack of association among the nodes, mobility, device heterogeneity, bandwidth, multihop and battery power constraints in ad hoc wireless networks make the design of efficient routing protocols a major challenge. MANET is more susceptible to be attacked than wired network. Encryption, cryptography and authentication are the preventive measures that may be used at the initial level for sinking the attack possibilities, but these techniques are not capable to protect a network from newer attacks. Considering the parameters like bandwidth, energy, security, etc. many routing protocols categorized as reactive, proactive and hybrid have been proposed for communications; still an efficient communication and the dropping of packets are the major issues in MANET that need to be focused. Moreover, possibility of dropping a packet during transmission by malicious node cannot be ignored. In this paper, we have presented a practical approach for cluster head election and the possible probabilities. Issues with the packet dropping at localized level and maintaining the stability of the nodes have been explored. We also present a malicious node detection method. Preliminary simulation results have shown that proposed system reduces the impact of sequence number attack and packet dropping attack to very high extend.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins, C.E.: Ad hoc Networking, pp. 198–264. Addison-Wesley, New York (2001)
Gupta, S.S., Ray, S.S., Mistry, O., Naskar, M.K.: A stochastic approach for topology management of mobile ad hoc networks. In: Asian International Mobile Computing Conference, pp. 90–99. Jadavpur University, Kolkata (2007)
Perkins, C.E., Royer, E.M., Das S.R.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing and Applications, vol. 3, pp. 99–100. New Orleans, LA, USA (1999)
Johnson, D., Maltz, D.: In: Imielinski, T., Korth, H. (eds.) Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing. Kluwer (1996)
IEEE Std. 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1997)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L., Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47, UCLA Computer Science Department (2004)
IEEE 802.11: Wireless LAN Media Access Control (MAC) and Physical layer (PHY) Specifications. ANSI/EIEEE Std. 802.11 (1999)
Djahel, S., Nait-abdesselam, F., Zhang, Z.: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun. Surv. Tutor. 13, Fourth Quarter (2011)
Duarte-Melo, E.J., Liu, M.: Energy efficiency of many-to-one communication in wireless networks. In: Invited Paper in Proceeding of IEEE 45th Midwest Symposium on Circuits and Systems (MWSCAS’02), Volume 1,Tulsa (2002)
Murthy, S.R., Manoj, B.S.: Ad hoc Mobile Wireless Networks—Architectures and Protocols. Pearson Publication, New York (2014)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, New York, NY, USA: ACM Press, pp. 255–265. Boston, MA (2000)
Wang, D.: Malicious node detection mechanism for wireless ad hoc network. Int. J. Secur. (IJS) 7(1) (2013), School of Mathematical Sciences, Chuzhou University, China
Mishra, A., Nadkarni, K., Patcha, A., Virginia Tech: Intrusion detection in wireless ad hoc networks. IEEE Wirel. Commun. (2004)
Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. College of Computing, Georgia Institute of Technology
Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad hoc Mobile Wireless Networks- Principles, Protocols and Applications, pp. 267–270. Auerbach Publications, Taylor & Francis Group, Boca Raton (2012)
Dey, S.: Graph Theory with Applications, pp. 5–30. SPD (2012)
Krawetz, N.: Introduction to Network Security, pp. 5–13. Thomson Learning, Boston (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Sonekar, S.V., Kshirsagar, M.M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, vol 404. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2695-6_27
Download citation
DOI: https://doi.org/10.1007/978-81-322-2695-6_27
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2693-2
Online ISBN: 978-81-322-2695-6
eBook Packages: EngineeringEngineering (R0)