Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks

被引:0
|
作者
Kukreja, Deepika [1 ]
Miglani, Mohit
Dhurandher, S. K.
Reddy, B. V. R. [1 ]
机构
[1] GGSIP Univ, USICT, Delhi, India
关键词
security; penalize; Mobile Ad Hoc Networks; secure routing; routing protocols; trust; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the security. Security is a significant challenge that needs to be addressed as member or group authentication, confidentiality, data integrity and access control are strong necessities for such kind of networks. We use Dynamic Source Routing (DSR) as the principal protocol and present a method which selects the most trustworthy path between the source and destination that is free from malicious nodes. The proposed method identifies and punishes the malicious nodes inducing a variety of attacks like: malicious topology change behavior, dropping data packets, dropping control packets and packet modification.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [1] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [2] Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
    Alghamdi, Turki Ali
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [3] Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 404 - 406
  • [4] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [5] A New Security Localization method for Detecting malicious beacon nodes in wireless sensor networks
    Miao, Chen
    Bao, Peng
    Liang, Ma
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 428 - 432
  • [6] Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
    Kumar, Mandeep
    Ali, Jahid
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (01): : 444 - 468
  • [7] Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
    Zhang, Zhiming
    Yang, Yu
    Yang, Wei
    Wu, Fuying
    Li, Ping
    Xiong, Xiaoyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [9] Locating Malicious Nodes for Data Aggregation in Wireless Networks
    Xu, Xiaohua
    Wang, Qian
    Cao, Jiannong
    Wan, Peng-Jun
    Ren, Kui
    Chen, Yuanfang
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3056 - 3060
  • [10] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    [J]. 2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524