Misbehaving Attack Mitigation Technique for Multicast Security in Mobile Ad Hoc Networks (manet)

نویسنده

  • N. SHANTHI
چکیده

Node misbehavior problems have received increased attention in multicasting in Mobile ad hoc networks (MANET). The misbehaving nodes can be either selfish or malicious nodes. The main goal of the malicious nodes is to intentionally interrupt the network using various attacks. Hence it is essential to develop a mitigation technique against misbehaving attacks. In this paper, we propose a misbehaving attack mitigation technique for multicast security in MANET. Initially the nodes are categorized into strong and weak nodes according to their stability index which is estimated based on the link availability and mobility. Among the selected strong nodes, the nodes with high reputation index are chosen as initiator nodes which assist in attack detection. The initiator node detects the misbehaving nodes based on their packet delivery ratio. Upon misbehaving node detection, initiators employ recrimination based attack isolation technique to isolate the attacker node during data transmission. By simulation results we show that the proposed technique enhances security in MANET.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating Reliability in Mobile ad-hoc Networks Based on Monte Carlo Simulation (TECHNICAL NOTE)

Each system has its own definition of reliability. Reliability in mobile ad-hoc networks (MANET) could be interpreted as, the probability of reaching a message from a source node to destination, successfully. The variability and volatility of the MANET configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate. It is because, no single structure or configurat...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes

As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not en...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013