DocumentCode :
238666
Title :
Identifying the behavior: Nodes, Route and Collusion Attack´s in MANET
Author :
Kranthi Kumar, K. ; Vasantha Laxmi, C.H. ; Srinivasa Rao, K.
Author_Institution :
Dept. of IT, SNIST, Hyderabad, India
fYear :
2014
fDate :
27-29 Nov. 2014
Firstpage :
124
Lastpage :
129
Abstract :
Ubiquitous network connectivity and Mobile communications have recently attracted many researchers. While implementing Mobile Ad Hoc Networks (MANETs) its major problem security is widely addressed, but various challenges still persist such as the different kinds of misbehavior of node may be exhibits, detection of routing misbehavior and collusion of misbehaving nodes has not been adequately addressed yet. One such solution to overcome selfishly behaving nodes in wireless network is to detect and exclude them .There are several secure routing protocols to detect routing misbehavior in the direct neighborhood. In this paper, we presented an improved version of Leak detector mechanism and iterative probing mechanism to detect colluding malicious nodes, manipulations of route in wireless multi hop networks. Leak detector enables the calculation of the packet-loss ratio for the individual nodes. Iterative probing enables reliable detection of selfish nodes that drop packets in a MANET. Our Simulation results of these mechanisms shows that they are highly adaptable, reliable and most effective way to identify any selfish behaviors, routing and collusion of misbehaving nodes.
Keywords :
iterative methods; leak detection; mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; wireless mesh networks; MANET; colluding malicious node detection; collusion attack; iterative probing mechanism; leak detector mechanism; mobile ad hoc network; mobile communication; packet-loss ratio; routing misbehavior detection; secure routing protocol; selfish node detection; ubiquitous network; wireless multihop network; Cryptography; Detectors; Mobile ad hoc networks; Probes; Routing; Routing protocols; Iterative Probing and Collusion; Leak detector; MANET; Routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Contemporary Computing and Informatics (IC3I), 2014 International Conference on
Conference_Location :
Mysore
Type :
conf
DOI :
10.1109/IC3I.2014.7019683
Filename :
7019683
Link To Document :
بازگشت