Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks

被引:0
|
作者
Singh, Yuvraj [1 ]
Jena, Sanjay Kumar [1 ]
机构
[1] Natl Inst Technol Rourkela, Dept Comp Sci & Engn, Odisha 769008, India
关键词
MANET; security attacks; malicious nodes; wireless network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an intrusion detection system to detect the malicious nodes in MANETs. The proposed detection algorithm is divided into two phases: detection during route establishment and detection during data forwarding. The detection effectiveness of the proposed algorithm is more than 80% and for some cases detection effectiveness may reach to 100%. The silent feature of proposed scheme is its simplicity and effectiveness in detecting malicious nodes.
引用
收藏
页码:410 / 419
页数:10
相关论文
共 50 条
  • [1] Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
    Nasser, Nidal
    Chen, Yunfeng
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1154 - 1159
  • [2] Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks
    Sivanesh, S.
    Dhulipala, V. R. Sarma
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1511 - 1524
  • [3] Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks
    S. Sivanesh
    V. R. Sarma Dhulipala
    [J]. Wireless Personal Communications, 2022, 124 : 1511 - 1524
  • [4] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [5] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [6] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
  • [7] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [8] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [9] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
  • [10] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165