Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks

被引:0
|
作者
Rahman, Mohsin Ur [1 ]
Abbas, Sohail [2 ]
Latif, Seemab [3 ]
机构
[1] Univ Malakand, Chakdara, Pakistan
[2] Univ Sharjah, Coll Sci, Dept Comp Sci, Sharjah, U Arab Emirates
[3] NUST, Dept Comp, Islamabad, Pakistan
关键词
REPLICATION ATTACKS; SENSOR;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad Hoc Networks (MANETs) are self arranging, dynamic, infrastructure-less and multi-hop networks formed by a group(s) of mobile nodes (MNs), which transmit information via wireless channels. The broadcast nature of the wireless medium makes MANETs vulnerable to various types of attacks (e.g., masquerading attack, node replication attack, Sybil attack and so on). A critical challenge that allows replicas to defeat the well-known detection algorithms is known as abnormal or selected silence. This problem arises when replicas intentionally become silent at specific time periods or stop broadcasting detection packets. As a result, the attackers become invisible and successfully evade the detection process. Most of the existing detection techniques are vulnerable to these malicious activities. In this paper, we propose a new lightweight technique for mitigating the above issue in MANETs. Our solution is lightweight and does not need the use of extra communication or geographical positioning system (GPS). Simulation results show excellent detection accuracy of the proposed scheme.
引用
收藏
页码:191 / 194
页数:4
相关论文
共 50 条
  • [41] Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Mulla, Mohsin
    Sambare, Santosh
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [42] Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
    Su, Ming-Yang
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (04) : 246 - 260
  • [43] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [44] Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks
    Gunasekaran, R.
    Uthariaraj, V. Rhymend
    Sudharsan, R.
    Priyadarshini, S. Sujitha
    Yamini, U.
    [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1857 - 1860
  • [45] Fadip: Lightweight Publish/Subscribe for Mobile Ad Hoc Networks
    Paridel, Koosha
    Vanrompay, Yves
    Berbers, Yolande
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 798 - 810
  • [46] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Tameem Eissa
    Shukor Abd Razak
    Mohd Asri Ngadi
    [J]. Arabian Journal for Science and Engineering, 2012, 37 : 2179 - 2192
  • [47] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Eissa, Tameem
    Abd Razak, Shukor
    Ngadi, Mohd Asri
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2012, 37 (08) : 2179 - 2192
  • [48] Efficient Malicious Detection for AODV in Mobile Ad-hoc Network
    Amaresh, M.
    Scholar, P. G.
    Usha, G.
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 263 - 269
  • [49] Optimal placement of Detection Nodes for Ad hoc Networks
    Islam, M. Hasan
    Zubair, Izza
    Butt, M. Farrog
    Nadeem, Kamran
    Khan, Shoab A.
    [J]. NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 544 - 546
  • [50] Detecting unauthorized and compromised nodes in mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitris
    Douligeris, Christos
    [J]. AD HOC NETWORKS, 2007, 5 (03) : 289 - 298