Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(152.66KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Daxing WANG
Pages - 1 - 7     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7   Issue - 1    |    Publication Date - June 2013  Table of Contents
MORE INFORMATION
KEYWORDS
Ad Hoc Network, Malicious Node, Detection, Sybil Attacks, Sinkhole Attacks, Security.
ABSTRACT
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
CITED BY (2)  
1 Sonekar, S. V., & Kshirsagar, M. M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 317-328). Springer India.
2 Hashemnejad, R., & Purushothaman, K. Wireless ad hoc networks:malicious nodedetection.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 CiteSeerX
4 refSeek
5 Scribd
6 slideshare
7 PdfSR
1 Patrick S. Chen, Shing-Han Li and Yung-Kuei Liu, “Scheduling the Access to Multi-Level Secure Databases in a Wireless Network Environment”, International Journal of Innovative Computing, Information and Control (IJICIC), vol.6, no. 12,pp.5381-5404, 2011.
2 Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, “An Acquisitional Query Processing System for Sensor Networks”. ACM Trans. Database Syst., 30(1):122–173, 2005.
3 M. Palomera-Perez, H. Benitez-Perez and J. Ortega-Arjona, “Coordinated Tasks: A Framework for Distributed Tasks in Mobile Area Networks”, ICIC Express Letters, Volume 5,Issue 8(B), pp.3941-3946, 2011.pp.2817-2824,2011.
4 Xueyan Tang and Jianliang Xu. “Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks”. IEEE/ACM Trans. 16(4):904–917, 2008.
5 Yingqi Xu, Tao-Yang Fu, Wang-Chien Lee, “Processing k nearest neighbor queries in locationaware sensor networks”. Signal Processing, 87(12):2861–2881, 2007.
6 Jilong XUE, Xiaogang QI, Chenyu WANG. “An Energy-Balance Routing Algorithm Based on Node Classification for Wireless Sensor Networks”. Journal of Computational Information Systems, Vol. 7 (7): 2277- 2284, 2011.
7 Yiliang Han, Xiaolin Gui and Xuguang Wu, “Parallel Multi-Recipient Signcryption for Imbalanced Wireless Networks”, International Journal of Innovative Computing, Information and Control (IJICIC), vol.6, no.8,pp.3521-3630, 2010.
8 Mustafa Fayomi, “An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks”. International Journal of Security, Vol. 5 (1): 35- 61, 2011.
9 Marti, S., T. J., Lai, K. and Baker, M. “Mitigating routing misbehavior in mobile ad hoc networks”. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000) August 6-11, 2000, Boston, USA. Boston, MA, ACM Press,pp. 255-265.
10 Aamir Shahzad, “Cryptography and authentication placement to provide secure channel for SCADA communication”, International Journal of Security, Vol. 6 (3): 28- 44, 2012.
11 Loanis, K. and Dimitrou, T. “Towards intrusion detection in wireless sensor networks”. In Proceedings of the 13th European Wireless Conference, April 1-4, 2007, Paris, France.
12 Junior, W., Figueiredo, T. and Wong, H. “Malicious node detection in wireless sensor networks”. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04), April 26-30, 2004, Santa Fe, New Mexico.
Dr. Daxing WANG
School of Mathematical Sciences, Chuzhou University No.1528, Feng-Le Road, Chuzhou, 239000?Anhui, P.R. - China
starleewipm@126.com