• DocumentCode
    238666
  • Title

    Identifying the behavior: Nodes, Route and Collusion Attack´s in MANET

  • Author

    Kranthi Kumar, K. ; Vasantha Laxmi, C.H. ; Srinivasa Rao, K.

  • Author_Institution
    Dept. of IT, SNIST, Hyderabad, India
  • fYear
    2014
  • fDate
    27-29 Nov. 2014
  • Firstpage
    124
  • Lastpage
    129
  • Abstract
    Ubiquitous network connectivity and Mobile communications have recently attracted many researchers. While implementing Mobile Ad Hoc Networks (MANETs) its major problem security is widely addressed, but various challenges still persist such as the different kinds of misbehavior of node may be exhibits, detection of routing misbehavior and collusion of misbehaving nodes has not been adequately addressed yet. One such solution to overcome selfishly behaving nodes in wireless network is to detect and exclude them .There are several secure routing protocols to detect routing misbehavior in the direct neighborhood. In this paper, we presented an improved version of Leak detector mechanism and iterative probing mechanism to detect colluding malicious nodes, manipulations of route in wireless multi hop networks. Leak detector enables the calculation of the packet-loss ratio for the individual nodes. Iterative probing enables reliable detection of selfish nodes that drop packets in a MANET. Our Simulation results of these mechanisms shows that they are highly adaptable, reliable and most effective way to identify any selfish behaviors, routing and collusion of misbehaving nodes.
  • Keywords
    iterative methods; leak detection; mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; wireless mesh networks; MANET; colluding malicious node detection; collusion attack; iterative probing mechanism; leak detector mechanism; mobile ad hoc network; mobile communication; packet-loss ratio; routing misbehavior detection; secure routing protocol; selfish node detection; ubiquitous network; wireless multihop network; Cryptography; Detectors; Mobile ad hoc networks; Probes; Routing; Routing protocols; Iterative Probing and Collusion; Leak detector; MANET; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Contemporary Computing and Informatics (IC3I), 2014 International Conference on
  • Conference_Location
    Mysore
  • Type

    conf

  • DOI
    10.1109/IC3I.2014.7019683
  • Filename
    7019683