Skip to main content
Top
Published in: Cluster Computing 3/2019

29-03-2018

Malicious node identification using quantitative intrusion detection techniques in MANET

Authors: M. Arul Selvan, S. Selvakumar

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to rapid proliferation of WSN, the application of wireless devices or nodes and usage of mobile computing devices changed the shape of network security. One of the field which need the most security is Mobile Ad hoc Network (MANET). The term ad hoc itself ensures that there is no central entity in order to govern the nodes. The issue of security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. The traditional method of firewall and encryption is not sufficient to protect the network. Therefore an intrusion detection system must be added to the mobile ad hoc network. One of the different kinds of misbehavior a node may exhibit is selfishness. A indiscipline or selfish or node wants to protect own resources when using the services of others and consuming their resources. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we de-scribe different method for detecting indiscipline or malicious nodes in mobile ad hoc network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008) Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)
2.
go back to reference He, B., Joakim, H., Gu, Q.: Security in adhoc networks, An essay produced for the course secure computer systems HT2005 (1DT658) (2005) He, B., Joakim, H., Gu, Q.: Security in adhoc networks, An essay produced for the course secure computer systems HT2005 (1DT658) (2005)
3.
go back to reference IEEE Std. 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997) IEEE Std. 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997)
4.
go back to reference Mamatha, G.S., Sharma, S.C.: A robust approach to detect and prevent network layer attacks in MANETS. Int. J. Comput. Sci. Secur. 4(3), 275–284 (2009) Mamatha, G.S., Sharma, S.C.: A robust approach to detect and prevent network layer attacks in MANETS. Int. J. Comput. Sci. Secur. 4(3), 275–284 (2009)
5.
go back to reference Sundararajan, T.V.P., Shanmugam, A.: Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. Int. J. Comput. Sci. Secur. 3(2), 62–75 (2009) Sundararajan, T.V.P., Shanmugam, A.: Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. Int. J. Comput. Sci. Secur. 3(2), 62–75 (2009)
6.
go back to reference Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 22, 545–550 (2008) Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 22, 545–550 (2008)
7.
go back to reference Dhanalakshmi, S., Rajaram, M.: A reliable and secure framework for detection and isolation of malicious nodes in MANET. Int. J. Comput. Sci. Netw. Secur. 8(10), 184–190 (2008) Dhanalakshmi, S., Rajaram, M.: A reliable and secure framework for detection and isolation of malicious nodes in MANET. Int. J. Comput. Sci. Netw. Secur. 8(10), 184–190 (2008)
8.
go back to reference Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008) Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008)
9.
go back to reference Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151–1167 (2008)CrossRef Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151–1167 (2008)CrossRef
10.
go back to reference Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31, 708–721 (2008)CrossRef Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31, 708–721 (2008)CrossRef
11.
go back to reference Komninos, N., Douligeris, C.: LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7(1), 171–182 (2008)CrossRef Komninos, N., Douligeris, C.: LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7(1), 171–182 (2008)CrossRef
12.
go back to reference Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H.: AACK: Adaptive acknowledgment intrusion detection for MANET with node detection. In: 24th IEEE International Conference on Enhancement, Advanced Information Networking and Applications (AINA) (2010) Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H.: AACK: Adaptive acknowledgment intrusion detection for MANET with node detection. In: 24th IEEE International Conference on Enhancement, Advanced Information Networking and Applications (AINA) (2010)
13.
go back to reference Mohammed, M.N., Sulaiman, N.: Intrusion detection system based on SVM for WLAN. Procedia Technol. 1, 313–317 (2012)CrossRef Mohammed, M.N., Sulaiman, N.: Intrusion detection system based on SVM for WLAN. Procedia Technol. 1, 313–317 (2012)CrossRef
14.
go back to reference Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef
15.
go back to reference Duhan, S., Khandnor, P.: Intrusion detection system in wireless sensor networks: a comprehensive review. In: Electrical, Electronics, and Optimization Techniques in IEEE, pp. 2707–2713 (2016) Duhan, S., Khandnor, P.: Intrusion detection system in wireless sensor networks: a comprehensive review. In: Electrical, Electronics, and Optimization Techniques in IEEE, pp. 2707–2713 (2016)
16.
go back to reference Basabaa, A., Sheltami, T., Shakshuki, E.: Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Comput. Sci. 32, 571–578 (2014)CrossRef Basabaa, A., Sheltami, T., Shakshuki, E.: Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Comput. Sci. 32, 571–578 (2014)CrossRef
17.
go back to reference Pattanayak, B.K., Rath, M.: A mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10(6), 970–975 (2014)CrossRef Pattanayak, B.K., Rath, M.: A mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10(6), 970–975 (2014)CrossRef
18.
go back to reference Choi, S., Kim, D., Lee, D., Jung, J.: International Conference on Sensor Networks, Ubiquitous, and Trust-worthy Computing, pp. 343–348 (2008) Choi, S., Kim, D., Lee, D., Jung, J.: International Conference on Sensor Networks, Ubiquitous, and Trust-worthy Computing, pp. 343–348 (2008)
19.
go back to reference Song, N., Qian, L., Li, X.: 19th IEEE International Parallel and Distributed Processing Symposium (2005) Song, N., Qian, L., Li, X.: 19th IEEE International Parallel and Distributed Processing Symposium (2005)
20.
go back to reference Mutlu, S., Yilmaz, G.: A distributed cooperative trust based intrusion detection framework for MANETs. In: The Seventh International Conference on Networking and Services (2011) Mutlu, S., Yilmaz, G.: A distributed cooperative trust based intrusion detection framework for MANETs. In: The Seventh International Conference on Networking and Services (2011)
21.
go back to reference Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking computing, pp. 146–155. ACM, Long Beach, CA (2001) Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking computing, pp. 146–155. ACM, Long Beach, CA (2001)
22.
go back to reference Mitchell, R., Chen, R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef Mitchell, R., Chen, R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)CrossRef
23.
go back to reference Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)CrossRef Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)CrossRef
24.
go back to reference Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28(1), 18–28 (2009)CrossRef Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28(1), 18–28 (2009)CrossRef
25.
go back to reference Li, G., He, J., Fu, Y.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18), 4324–4332 (2008)CrossRef Li, G., He, J., Fu, Y.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18), 4324–4332 (2008)CrossRef
Metadata
Title
Malicious node identification using quantitative intrusion detection techniques in MANET
Authors
M. Arul Selvan
S. Selvakumar
Publication date
29-03-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2418-2

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner