Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

24-01-2021

RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET

Authors: R. Thiagarajan, R. Ganesan, V. Anbarasu, M. Baskar, K. Arthi, J. Ramkumar

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To keep the process of routing and data transmission operations, it’s needed for a proper layer of security to keep it safe from malicious attacks. So in this paper, we proposed a framework that helps in detecting the malicious nodes at each of the destinations. After the detection process, it is isolated and discarded in while path establishment through various techniques. The development of an algorithm that supports Multipath Reliable Routing helps in determining paths for a set of disjoint nodes. Based on the index of reliability the paths are reordered. Now the process of information in form of data are been dispersed from source to destination. The main primary path is set to transfer the information. The final destination in case of mismatch of information transferred from a source when received at destination then feedback is given in negative manner stating that there is a mismatch of data along with the information related to the transmission and its path. Hence due to this, the destination will be able to recover since the information is checked each time for reliability. The final results show that the proposed approach results and have a greater impact when compared to the existing methods. Further, it reduces delay in packet transmission and overhead parallel it increases the delivery of packets.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Farooq, A., Dhanant, S., & Saswati, S. (2003). Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th. Farooq, A., Dhanant, S., & Saswati, S. (2003). Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th.
2.
go back to reference Anand, P., Jim, P., Anupam, J., Michaela, I., & Tom, K. (2005). Secure routing and intrusion detection in ad hoc networks. In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on March 2005. Anand, P., Jim, P., Anupam, J., Michaela, I., & Tom, K. (2005). Secure routing and intrusion detection in ad hoc networks. In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on March 2005.
3.
go back to reference Madhavi, S., & Tai, H. K. (2008). An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications, 2(3), 2008. Madhavi, S., & Tai, H. K. (2008). An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications, 2(3), 2008.
4.
go back to reference Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of SCS CNDS, San Antonio, TX, Jan. 27–31, 2002, pp. 193–204. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of SCS CNDS, San Antonio, TX, Jan. 27–31, 2002, pp. 193–204.
5.
go back to reference Li, Z. & Delgado-Frias, J. G. (2007). MARS: Misbehavior detection in ad hoc networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE Publication Date: 26–30 Nov. 2007. Li, Z. & Delgado-Frias, J. G. (2007). MARS: Misbehavior detection in ad hoc networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE Publication Date: 26–30 Nov. 2007.
6.
go back to reference Yanchao, Z., Wenjing, L., Wei, L., & Yuguang, F. (2007). A secure incentive protocol for mobile ad hoc networks. Wireless Networks (WINET), 13(5), 2007. Yanchao, Z., Wenjing, L., Wei, L., & Yuguang, F. (2007). A secure incentive protocol for mobile ad hoc networks. Wireless Networks (WINET), 13(5), 2007.
7.
go back to reference Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. MobiCom: Proc.CrossRef Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. MobiCom: Proc.CrossRef
8.
go back to reference Chin-Yang, H. T. (2006). Distributed intrusion detection models for mobile ad hoc networks. University of California at Davis Davis, CA, USA, 2006. Chin-Yang, H. T. (2006). Distributed intrusion detection models for mobile ad hoc networks. University of California at Davis Davis, CA, USA, 2006.
9.
go back to reference Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad-hoc networks. In The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 26–27 June 2006. Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad-hoc networks. In The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 26–27 June 2006.
10.
go back to reference Lou, W., Liu, W., & Fang, Y. (2004). SPREAD: enhancing data confidentiality in mobile ad hoc networks. In IEEE INFOCOM 2004, pp. 2404–2413. Lou, W., Liu, W., & Fang, Y. (2004). SPREAD: enhancing data confidentiality in mobile ad hoc networks. In IEEE INFOCOM 2004, pp. 2404–2413.
11.
go back to reference Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., & Yesha, Y. (2008). Threshold based intrusion detection in adhoc networks and secure AODV. Elsevier Science Publishers B. V., Ad Hoc Networks Journal (ADHOCNET), June 2008. Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., & Yesha, Y. (2008). Threshold based intrusion detection in adhoc networks and secure AODV. Elsevier Science Publishers B. V., Ad Hoc Networks Journal (ADHOCNET), June 2008.
14.
go back to reference Baskar, M., Ramkumar, J., Ritik, R., & Raghav, K. (2020). A deep learning based approach for automatic detection of bike riders with no helmet and number plate recognition. International Journal of Advanced Science and Technology, 29(4), 1844–1854. Baskar, M., Ramkumar, J., Ritik, R., & Raghav, K. (2020). A deep learning based approach for automatic detection of bike riders with no helmet and number plate recognition. International Journal of Advanced Science and Technology, 29(4), 1844–1854.
15.
go back to reference Ernesto, J. C. (2006). Vulnerabilities of intrusion detection systems in mobile ad-hoc networks—The routing problem 2006. Ernesto, J. C. (2006). Vulnerabilities of intrusion detection systems in mobile ad-hoc networks—The routing problem 2006.
17.
go back to reference Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312. Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312.
20.
21.
go back to reference Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. GlobeCom: Proc. Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. GlobeCom: Proc.
23.
go back to reference Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: preventing selfish in mobile ad hoc networks. In Proceedings of WCNC’05, 2005. Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: preventing selfish in mobile ad hoc networks. In Proceedings of WCNC’05, 2005.
24.
go back to reference Madhumitha, R., Ilango, K., Vimal, S., & Suresh, A. (2020). Analysis of obstructive sleep apnea disorder with accuracy prediction using SVM for smart environment. ACM Transactions on Multimedia Computing, Communications, and Applications. https://doi.org/10.1145/3382782.CrossRef Madhumitha, R., Ilango, K., Vimal, S., & Suresh, A. (2020). Analysis of obstructive sleep apnea disorder with accuracy prediction using SVM for smart environment. ACM Transactions on Multimedia Computing, Communications, and Applications. https://​doi.​org/​10.​1145/​3382782.CrossRef
25.
go back to reference Panagiotis, P., & Zygmunt, J. H. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006. Panagiotis, P., & Zygmunt, J. H. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006.
Metadata
Title
RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET
Authors
R. Thiagarajan
R. Ganesan
V. Anbarasu
M. Baskar
K. Arthi
J. Ramkumar
Publication date
24-01-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08092-0

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue