A Novel Defence Scheme Against Selfish Node Attack in Manet
2013, International Journal on Computational Science & Applications
https://doi.org/10.5121/IJCSA.2013.3305Abstract
Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new Intrusion Detection System (IDS) algorithm has proposed against selfish node attack in MANET. Here the behavior of selfish node is unnecessary flooding the information in network and block all types of packets transferring between the reliable nodes. Proposed IDS Algorithm identifies the behavior of selfish node and also blocked their misbehavior activities. In case of selfish node attack network performance is almost negligible but after applying IDS on attack network performance is enhanced up to 92% and provides 0% Infection rate from attack.
References (13)
- Charles E, G. He "Destination Sequenced Distance Vector (DSDV) Protocol" http//www.citeseer.ist.psu.edu/531710.html, 2003C.
- Hao Yang, Haiyun Luo. Fan Ye, Songwu Lu, and Lixia Zhang. "Security in mobile ad hoc networks: Challenges and solutions". IEEE Wireless Communications , February 2004.
- Shree Murthy and J. J. Garcia-Luna-Aceves. "An Efficient Routing Protocol for Wireless Networks". Mobile Networks and Applications, 1(2):183-197, 1996.
- Y-C Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Sec. and Privacy, May-June 2004.
- Khairul Azmi, Abu Bakar and James Irvine. " A Scheme for Detecting Selfish Nodes in MANET using OMNET++", 2010 Sixth International Conference on Wireless and Mobile Communications, pp 411-414, 2010.
- Al-Shurman, M. Yoo, S. Park, "Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference", 2004, pp. 96-97.
- Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), "Mitigating routing misbehavior in mobile ad-hoc networks", Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113-197-6, pp. 255-265.
- S. Buchegger, C. Tissieres, and J. Y. Le Boudec. "A test bed for misbehavior detection in mobile ad- hoc networks". Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
- P. Michiardi and R. Molva. Core: "A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks", In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107 121, Portorosz, Slovenia, September 2002.
- A. Patcha and A. Mishra, "Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks", Radio and Wireless Conference, 2003. RAWCON '03, Proceedings, pp. 75-78, 10-13 Aug. 2003.
- S. Bansal and M. Baker. "Observation-Based Cooperation Enforcement in Ad hoc Networks", July 2003. Available on: http://arxiv.org/pdf/cs.NI/0307012.
- K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK:Preventing Selfishness in Mobile Ad hoc Networks," inProc. of Wireless Communications and NetworkingConference (WCNC'05), vol. 4, March 2005, pp. 2137-2142.
- K.Vijaya "Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks," TENCON 2008, IEEE Region 10 Conference, November 2008, pp. 1-7.