An experimental analysis on various techniques for malicious node detection in MANET

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile ad hoc networks (MANETs) are a subclass of wireless ad hoc networks having exceptional characteristics of dynamic system topology and moving nodes. MANETs are infrastructure-less, self arranging networks intended to support mobility. Because of these attributes, there is need of separate routing protocols for MANET. The advantages such as non-limited versatility, simple organization attributes of MANETs make them exceptionally important and very reasonable mainly for crisis situations and military applications. Within the sight of malevolent nodes, this prerequisite may lead to genuine security threats; for example, such nodes may disturb the routing process. In this specific circumstance, avoiding or identifying malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper is focuses on surveying and a reviewing of MANET security attacks and approaches to defend from vulnerabilities. The routing protocol mainly concerned in this approach is Dynamic Source Routing Protocol (DSR). The schemes like Watchdog, TWOACK, AACK, EAACK and CBDS have been used for detection of malicious nodes in MANET. Our research aim is to identify current trends, open challenges and future research directions in the deployment of MANET by considering the malicious node detection scheme. In order to bridge the research gap in terms of performance, detection rate and overhead; also to overcome the challenges of existing security issues regarding MANET. The aim is to propose an improved cooperative bait detection scheme (ICBDS) to detect malicious node maintaining minimal overhead.

Cite

CITATION STYLE

APA

Arage, C. S., & Satyanarayana, K. V. V. (2019). An experimental analysis on various techniques for malicious node detection in MANET. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 3), 182–191. https://doi.org/10.35940/ijitee.I3036.0789S319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free