Detection of malicious node in mobile ad-hoc network
Title | Detection of malicious node in mobile ad-hoc network |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Sangeetha, V., Kumar, S. S. |
Conference Name | 2018 International Conference on Power, Signals, Control and Computation (EPSCICON) |
Date Published | jan |
ISBN Number | 978-1-5386-4208-5 |
Keywords | Ad Hoc Network Security, adaptive acknowledgment, AODV, Communication system security, compositionality, cryptography, encryption software, firewalls, firewalls software, intrusion detection mechanisms, malicious node, malicious node detection, MANET, Metrics, mobile ad hoc network, mobile ad hoc networks, mobile nodes, network packet delivery ratio, Network security, NS2 simulation, pubcrawl, Resiliency, Routing, routing overhead, Routing protocols, security, selective acknowledgment, telecommunication network routing, Wireless communication, wireless links |
Abstract | In recent years, the area of Mobile Ad-hoc Net-work(MANET) has received considerable attention among the research community owing to the advantages in its networking features as well as solving the unsolved issues in it. One field which needs more security is the mobile ad hoc network. Mobile Ad-hoc Network is a temporary network composed of mobile nodes, connected by wireless links, without fixed infrastructure. Network security plays a crucial role in this MANET and the traditional way of protecting the networks through firewalls and encryption software is no longer effective and sufficient. In order to provide additional security to the MANET, intrusion detection mechanisms should be added. In this paper, selective acknowledgment is used for detecting malicious nodes in the Mobile ad-hoc network is proposed. In this paper we propose a novel mechanism called selective acknowledgment for solving problems that airse with Adaptive ACKnowledgment (AACK). This mechanism is an enhancement to the AACK scheme where its Packet delivery ration and detection overhead is reduced. NS2 is used to simulate and evaluate the proposed scheme and compare it against the AACK. The obtained results show that the selective acknowledgment scheme outperforms AACK in terms of network packet delivery ratio and routing overhead. |
URL | https://ieeexplore.ieee.org/document/8379598 |
DOI | 10.1109/EPSCICON.2018.8379598 |
Citation Key | sangeetha_detection_2018 |
- mobile ad hoc networks
- wireless links
- Wireless communication
- telecommunication network routing
- selective acknowledgment
- security
- Routing protocols
- routing overhead
- Routing
- Resiliency
- pubcrawl
- NS2 simulation
- network security
- network packet delivery ratio
- mobile nodes
- Ad Hoc Network Security
- mobile ad hoc network
- Metrics
- MANET
- malicious node detection
- malicious node
- intrusion detection mechanisms
- firewalls software
- firewalls
- encryption software
- Cryptography
- Compositionality
- Communication system security
- AODV
- adaptive acknowledgment