Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks

被引:0
|
作者
Kukreja, Deepika [1 ]
Miglani, Mohit
Dhurandher, S. K.
Reddy, B. V. R. [1 ]
机构
[1] GGSIP Univ, USICT, Delhi, India
关键词
security; penalize; Mobile Ad Hoc Networks; secure routing; routing protocols; trust; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the security. Security is a significant challenge that needs to be addressed as member or group authentication, confidentiality, data integrity and access control are strong necessities for such kind of networks. We use Dynamic Source Routing (DSR) as the principal protocol and present a method which selects the most trustworthy path between the source and destination that is free from malicious nodes. The proposed method identifies and punishes the malicious nodes inducing a variety of attacks like: malicious topology change behavior, dropping data packets, dropping control packets and packet modification.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [21] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
    Guo, Yongan
    Tang, Xinyu
    Sun, Hongbo
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
  • [22] Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks
    Singh, Rupinder
    Singh, Jatinder
    Singh, Ravinder
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017, : 1 - 14
  • [23] The Detection Scheme Against Selective Forwarding of Smart Malicious Nodes With Reinforcement Learning in Wireless Sensor Networks
    Ding, Jingze
    Wang, Haozhen
    Wu, Yuanming
    [J]. IEEE SENSORS JOURNAL, 2022, 22 (13) : 13696 - 13706
  • [24] Study on Automatic Positioning of Malicious Mobile Nodes in Wireless Sensor Networks
    Zheng Wen-Kui
    Liu Kun
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1495 - 1499
  • [25] The impact of malicious nodes on the performance of wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +
  • [26] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    [J]. 2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [27] Security Enhancement of Wireless Networks with Wireless-Powered Full-Duplex Relay and Friendly Jammer Nodes
    Mobini, Zahra
    Mohammadi, Mohammadali
    Tellambura, Chintha
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 1329 - 1334
  • [28] A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks
    Reddy, Yenumula B.
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 462 - 468
  • [29] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    [J]. IMECS 2006: International Multiconference of Engineers and Computer Scientists, 2006, : 949 - 953
  • [30] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    [J]. Recent Advances in Engineering and Computer Science 2007, 2006, 62 : 44 - 48