Abstract
Due to rapid proliferation of WSN, the application of wireless devices or nodes and usage of mobile computing devices changed the shape of network security. One of the field which need the most security is Mobile Ad hoc Network (MANET). The term ad hoc itself ensures that there is no central entity in order to govern the nodes. The issue of security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. The traditional method of firewall and encryption is not sufficient to protect the network. Therefore an intrusion detection system must be added to the mobile ad hoc network. One of the different kinds of misbehavior a node may exhibit is selfishness. A indiscipline or selfish or node wants to protect own resources when using the services of others and consuming their resources. Malicious nodes that disobey the standard, degrades the performance of well-behaved nodes significantly. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we de-scribe different method for detecting indiscipline or malicious nodes in mobile ad hoc network.
Similar content being viewed by others
References
Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. Int. J. Comput. Sci. Secur. 2(3), 18–29 (2008)
He, B., Joakim, H., Gu, Q.: Security in adhoc networks, An essay produced for the course secure computer systems HT2005 (1DT658) (2005)
IEEE Std. 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997)
Mamatha, G.S., Sharma, S.C.: A robust approach to detect and prevent network layer attacks in MANETS. Int. J. Comput. Sci. Secur. 4(3), 275–284 (2009)
Sundararajan, T.V.P., Shanmugam, A.: Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. Int. J. Comput. Sci. Secur. 3(2), 62–75 (2009)
Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 22, 545–550 (2008)
Dhanalakshmi, S., Rajaram, M.: A reliable and secure framework for detection and isolation of malicious nodes in MANET. Int. J. Comput. Sci. Netw. Secur. 8(10), 184–190 (2008)
Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008)
Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1151–1167 (2008)
Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31, 708–721 (2008)
Komninos, N., Douligeris, C.: LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7(1), 171–182 (2008)
Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H.: AACK: Adaptive acknowledgment intrusion detection for MANET with node detection. In: 24th IEEE International Conference on Enhancement, Advanced Information Networking and Applications (AINA) (2010)
Mohammed, M.N., Sulaiman, N.: Intrusion detection system based on SVM for WLAN. Procedia Technol. 1, 313–317 (2012)
Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)
Duhan, S., Khandnor, P.: Intrusion detection system in wireless sensor networks: a comprehensive review. In: Electrical, Electronics, and Optimization Techniques in IEEE, pp. 2707–2713 (2016)
Basabaa, A., Sheltami, T., Shakshuki, E.: Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Comput. Sci. 32, 571–578 (2014)
Pattanayak, B.K., Rath, M.: A mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10(6), 970–975 (2014)
Choi, S., Kim, D., Lee, D., Jung, J.: International Conference on Sensor Networks, Ubiquitous, and Trust-worthy Computing, pp. 343–348 (2008)
Song, N., Qian, L., Li, X.: 19th IEEE International Parallel and Distributed Processing Symposium (2005)
Mutlu, S., Yilmaz, G.: A distributed cooperative trust based intrusion detection framework for MANETs. In: The Seventh International Conference on Networking and Services (2011)
Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking computing, pp. 146–155. ACM, Long Beach, CA (2001)
Mitchell, R., Chen, R.: A survey of intrusion detection in wireless network applications. Comput. Commun. 42, 1–23 (2014)
Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques systems and challenges. Comput. Secur. 28(1), 18–28 (2009)
Li, G., He, J., Fu, Y.: Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18), 4324–4332 (2008)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arul Selvan, M., Selvakumar, S. Malicious node identification using quantitative intrusion detection techniques in MANET. Cluster Comput 22 (Suppl 3), 7069–7077 (2019). https://doi.org/10.1007/s10586-018-2418-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2418-2