Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks

被引:0
|
作者
Kukreja, Deepika [1 ]
Miglani, Mohit
Dhurandher, S. K.
Reddy, B. V. R. [1 ]
机构
[1] GGSIP Univ, USICT, Delhi, India
关键词
security; penalize; Mobile Ad Hoc Networks; secure routing; routing protocols; trust; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the security. Security is a significant challenge that needs to be addressed as member or group authentication, confidentiality, data integrity and access control are strong necessities for such kind of networks. We use Dynamic Source Routing (DSR) as the principal protocol and present a method which selects the most trustworthy path between the source and destination that is free from malicious nodes. The proposed method identifies and punishes the malicious nodes inducing a variety of attacks like: malicious topology change behavior, dropping data packets, dropping control packets and packet modification.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [41] Detection of misbehaving nodes in malicious organization dominant networks in internet of things
    Liu, Wenmao
    Fang, Binxing
    Yin, Lihua
    Yu, Xiangzhan
    [J]. Liu, W. (liuwenmao@pact518.hit.edu.cn), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (07): : 223 - 231
  • [42] Detection of Malicious Nodes Using Collaborative Neighbour Monitoring in DSA Networks
    Takyi, Augustine
    Zlobinsky, Natasha
    Akuye-Shika, Odametey
    Johnson, David
    Densmore, Melissa
    [J]. COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 215 - 230
  • [43] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [44] A distributed detection and prevention scheme from malicious nodes in vehicular networks
    Bouali, Tarek
    Senouci, Sidi-Mohammed
    Sedjelmaci, Hichem
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (10) : 1683 - 1704
  • [45] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
  • [46] Individual Security and Network Design with Malicious Nodes
    Janus, Tomasz
    Skomra, Mateusz
    Dziubinski, Marcin
    [J]. INFORMATION, 2018, 9 (09)
  • [47] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    [J]. Wireless Personal Communications, 2019, 108 : 2117 - 2135
  • [48] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [49] Sentinel Based Malicious Relay Detection in Wireless IoT Networks
    Tandon, Anshoo
    Lim, Teng Joon
    Tefek, Utku
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2019, 21 (05) : 458 - 468
  • [50] A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
    Wei Zhang
    Shiwei Zhu
    Jian Tang
    Naixue Xiong
    [J]. The Journal of Supercomputing, 2018, 74 : 1779 - 1801