Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks

被引:0
|
作者
Rahman, Mohsin Ur [1 ]
Abbas, Sohail [2 ]
Latif, Seemab [3 ]
机构
[1] Univ Malakand, Chakdara, Pakistan
[2] Univ Sharjah, Coll Sci, Dept Comp Sci, Sharjah, U Arab Emirates
[3] NUST, Dept Comp, Islamabad, Pakistan
关键词
REPLICATION ATTACKS; SENSOR;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad Hoc Networks (MANETs) are self arranging, dynamic, infrastructure-less and multi-hop networks formed by a group(s) of mobile nodes (MNs), which transmit information via wireless channels. The broadcast nature of the wireless medium makes MANETs vulnerable to various types of attacks (e.g., masquerading attack, node replication attack, Sybil attack and so on). A critical challenge that allows replicas to defeat the well-known detection algorithms is known as abnormal or selected silence. This problem arises when replicas intentionally become silent at specific time periods or stop broadcasting detection packets. As a result, the attackers become invisible and successfully evade the detection process. Most of the existing detection techniques are vulnerable to these malicious activities. In this paper, we propose a new lightweight technique for mitigating the above issue in MANETs. Our solution is lightweight and does not need the use of extra communication or geographical positioning system (GPS). Simulation results show excellent detection accuracy of the proposed scheme.
引用
收藏
页码:191 / 194
页数:4
相关论文
共 50 条
  • [1] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    [J]. ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
  • [2] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [3] Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
    Nasser, Nidal
    Chen, Yunfeng
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1154 - 1159
  • [4] Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
    Rikli, Nasser-Eddine
    Alnasser, Aljawharah
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07): : 1 - 16
  • [5] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [6] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [7] An Approach towards Identification of Malicious Nodes in Mobile Ad Hoc Networks
    Thakurta, Parag Kumar Guha
    Sett, Sujoy
    [J]. 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 1016 - 1019
  • [8] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
  • [9] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
  • [10] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    [J]. DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542