Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

24.01.2021

RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET

verfasst von: R. Thiagarajan, R. Ganesan, V. Anbarasu, M. Baskar, K. Arthi, J. Ramkumar

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To keep the process of routing and data transmission operations, it’s needed for a proper layer of security to keep it safe from malicious attacks. So in this paper, we proposed a framework that helps in detecting the malicious nodes at each of the destinations. After the detection process, it is isolated and discarded in while path establishment through various techniques. The development of an algorithm that supports Multipath Reliable Routing helps in determining paths for a set of disjoint nodes. Based on the index of reliability the paths are reordered. Now the process of information in form of data are been dispersed from source to destination. The main primary path is set to transfer the information. The final destination in case of mismatch of information transferred from a source when received at destination then feedback is given in negative manner stating that there is a mismatch of data along with the information related to the transmission and its path. Hence due to this, the destination will be able to recover since the information is checked each time for reliability. The final results show that the proposed approach results and have a greater impact when compared to the existing methods. Further, it reduces delay in packet transmission and overhead parallel it increases the delivery of packets.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Farooq, A., Dhanant, S., & Saswati, S. (2003). Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th. Farooq, A., Dhanant, S., & Saswati, S. (2003). Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th.
2.
Zurück zum Zitat Anand, P., Jim, P., Anupam, J., Michaela, I., & Tom, K. (2005). Secure routing and intrusion detection in ad hoc networks. In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on March 2005. Anand, P., Jim, P., Anupam, J., Michaela, I., & Tom, K. (2005). Secure routing and intrusion detection in ad hoc networks. In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on March 2005.
3.
Zurück zum Zitat Madhavi, S., & Tai, H. K. (2008). An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications, 2(3), 2008. Madhavi, S., & Tai, H. K. (2008). An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications, 2(3), 2008.
4.
Zurück zum Zitat Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of SCS CNDS, San Antonio, TX, Jan. 27–31, 2002, pp. 193–204. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of SCS CNDS, San Antonio, TX, Jan. 27–31, 2002, pp. 193–204.
5.
Zurück zum Zitat Li, Z. & Delgado-Frias, J. G. (2007). MARS: Misbehavior detection in ad hoc networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE Publication Date: 26–30 Nov. 2007. Li, Z. & Delgado-Frias, J. G. (2007). MARS: Misbehavior detection in ad hoc networks. In Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE Publication Date: 26–30 Nov. 2007.
6.
Zurück zum Zitat Yanchao, Z., Wenjing, L., Wei, L., & Yuguang, F. (2007). A secure incentive protocol for mobile ad hoc networks. Wireless Networks (WINET), 13(5), 2007. Yanchao, Z., Wenjing, L., Wei, L., & Yuguang, F. (2007). A secure incentive protocol for mobile ad hoc networks. Wireless Networks (WINET), 13(5), 2007.
7.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. MobiCom: Proc.CrossRef Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. MobiCom: Proc.CrossRef
8.
Zurück zum Zitat Chin-Yang, H. T. (2006). Distributed intrusion detection models for mobile ad hoc networks. University of California at Davis Davis, CA, USA, 2006. Chin-Yang, H. T. (2006). Distributed intrusion detection models for mobile ad hoc networks. University of California at Davis Davis, CA, USA, 2006.
9.
Zurück zum Zitat Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad-hoc networks. In The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 26–27 June 2006. Tarag, F., & Robert, A. (2006). A node misbehaviour detection mechanism for mobile ad-hoc networks. In The 7th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 26–27 June 2006.
10.
Zurück zum Zitat Lou, W., Liu, W., & Fang, Y. (2004). SPREAD: enhancing data confidentiality in mobile ad hoc networks. In IEEE INFOCOM 2004, pp. 2404–2413. Lou, W., Liu, W., & Fang, Y. (2004). SPREAD: enhancing data confidentiality in mobile ad hoc networks. In IEEE INFOCOM 2004, pp. 2404–2413.
11.
Zurück zum Zitat Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., & Yesha, Y. (2008). Threshold based intrusion detection in adhoc networks and secure AODV. Elsevier Science Publishers B. V., Ad Hoc Networks Journal (ADHOCNET), June 2008. Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., & Yesha, Y. (2008). Threshold based intrusion detection in adhoc networks and secure AODV. Elsevier Science Publishers B. V., Ad Hoc Networks Journal (ADHOCNET), June 2008.
14.
Zurück zum Zitat Baskar, M., Ramkumar, J., Ritik, R., & Raghav, K. (2020). A deep learning based approach for automatic detection of bike riders with no helmet and number plate recognition. International Journal of Advanced Science and Technology, 29(4), 1844–1854. Baskar, M., Ramkumar, J., Ritik, R., & Raghav, K. (2020). A deep learning based approach for automatic detection of bike riders with no helmet and number plate recognition. International Journal of Advanced Science and Technology, 29(4), 1844–1854.
15.
Zurück zum Zitat Ernesto, J. C. (2006). Vulnerabilities of intrusion detection systems in mobile ad-hoc networks—The routing problem 2006. Ernesto, J. C. (2006). Vulnerabilities of intrusion detection systems in mobile ad-hoc networks—The routing problem 2006.
17.
Zurück zum Zitat Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312. Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312.
20.
Zurück zum Zitat Suchithra, M., Baskar, M., Ramkumar, J., Kalyanasundaram, P., & Amutha, B. (2020). Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02056-1.CrossRef Suchithra, M., Baskar, M., Ramkumar, J., Kalyanasundaram, P., & Amutha, B. (2020). Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS. Journal of Ambient Intelligence and Humanized Computing. https://​doi.​org/​10.​1007/​s12652-020-02056-1.CrossRef
21.
Zurück zum Zitat Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. GlobeCom: Proc. Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. GlobeCom: Proc.
23.
Zurück zum Zitat Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: preventing selfish in mobile ad hoc networks. In Proceedings of WCNC’05, 2005. Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: preventing selfish in mobile ad hoc networks. In Proceedings of WCNC’05, 2005.
24.
Zurück zum Zitat Madhumitha, R., Ilango, K., Vimal, S., & Suresh, A. (2020). Analysis of obstructive sleep apnea disorder with accuracy prediction using SVM for smart environment. ACM Transactions on Multimedia Computing, Communications, and Applications. https://doi.org/10.1145/3382782.CrossRef Madhumitha, R., Ilango, K., Vimal, S., & Suresh, A. (2020). Analysis of obstructive sleep apnea disorder with accuracy prediction using SVM for smart environment. ACM Transactions on Multimedia Computing, Communications, and Applications. https://​doi.​org/​10.​1145/​3382782.CrossRef
25.
Zurück zum Zitat Panagiotis, P., & Zygmunt, J. H. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006. Panagiotis, P., & Zygmunt, J. H. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 2006.
Metadaten
Titel
RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET
verfasst von
R. Thiagarajan
R. Ganesan
V. Anbarasu
M. Baskar
K. Arthi
J. Ramkumar
Publikationsdatum
24.01.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08092-0

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt