Malicious Behavior of Nodes in Mobile Ad-hoc Networks And Ways to Deal with them

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 3
Year of Publication : 2014
Authors : Abdul Naeem Shaikh & Jitendra Kumawat

pdf
Citation:
MLA Style:

Abdul Naeem Shaikh & Jitendra Kumawat, "Malicious Behavior of Nodes in Mobile Ad-hoc Networks And Ways to Deal with them" SSRG International Journal of Computer Science and Engineering 1.3 (2014): 1-4.

APA Style:

Abdul Naeem Shaikh & Jitendra Kumawat, (2014). Malicious Behavior of Nodes in Mobile Ad-hoc Networks And Ways to Deal with them. SSRG International Journal of Computer Science and Engineering 1.3, 1-4.

Abstract:

MANETs find their use particularly in the field where infrastructured network are not possible without having any centralized administration. Where this feature helps in rapidly deploying and establishing the ad Hoc networks, it makes it highly susceptible for attacks. Mobile adhoc networks (MANETs) rely on cooperation of all participating nodes. Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

References:

[1] William Stallings “Cryptography and Network Security”, Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006. 
[2] Patcha,A and Mishra,A - Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, IEEE. 2003. 
[3] Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009. 
[4] “Intrusion Detection System” http://www.intrusiondetection- systemgroup. co.uk/, Link visited on December 2010. 
[5] Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010
[6] C.Siva Ram Murthy and B S Manoj, -Mobile Ad Hoc Networks-Architecture and Protocols, Pearson Education, ISBN 81-317-0688-5 ,2004. 
[7] Theodore S. Rappaport, “Wireless Communication” Prentice Publisher, ISBN 0133755363, January 1994. 
[8] B. Wu et al, -A Survey of Attacks and Preventions in Mobile Ad Hoc Networks,Wireless/Mobile Network Security, Springer, Vol 17, 2006. 
[9] Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding- Royer, “A secure Routing Protocol for Ad hoc networks”, In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP’ 02), pp. 78-87, November 2002. 
[10] Alfawaer,Z. And Al Zoubi,S. , ”A Proposed Security Subsystem for Ad Hoc Networks” International Forum on Computer Science Technology and Applications,IEEE 2009.

Key Words:

Cryptography, intruder, malicious,Mobile ad hoc networks, mobile node, packet forwarding, routing protocols, vulnerability.