Research Article

Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

by  Radhika Saini, Manju Khari
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Issue 4
Published: April 2011
Authors: Radhika Saini, Manju Khari
10.5120/2422-3251
PDF

Radhika Saini, Manju Khari . Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network. International Journal of Computer Applications. 20, 4 (April 2011), 18-21. DOI=10.5120/2422-3251

                        @article{ 10.5120/2422-3251,
                        author  = { Radhika Saini,Manju Khari },
                        title   = { Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 20 },
                        number  = { 4 },
                        pages   = { 18-21 },
                        doi     = { 10.5120/2422-3251 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Radhika Saini
                        %A Manju Khari
                        %T Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network%T 
                        %J International Journal of Computer Applications
                        %V 20
                        %N 4
                        %P 18-21
                        %R 10.5120/2422-3251
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

References
  • C.Siva Ram Murthy and B S Manoj, ―Mobile Ad Hoc Networks-Architecture and Protocols‖, Pearson Education, ISBN 81-317-0688-5 ,2004.
  • Theodore S. Rappaport, “Wireless Communication” Prentice Publisher, ISBN 0133755363, January 1994.
  • B. Wu et al, ―A Survey of Attacks and Preventions in Mobile Ad Hoc Networks,‖ Wireless/Mobile Network Security, Springer, Vol 17, 2006.
  • Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture, International Journal of Electronics Engineering, pp. 189-196, 2010
  • William Stallings “Cryptography and Network Security”, Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006
  • Lioyd,S. and Adams,C.”Understanding PKI: Concepts, Standards and Deployment Considerations” ISBN 0-672-32391-5
  • Patcha,A and Mishra,A - Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks, IEEE. 2003
  • Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009
  • “Intrusion Detection System” http://www.intrusion-detection-system-group.co.uk/, Link visited on December 2010
  • Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010
  • S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad Hoc Routing for Wireless Networks”, Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001
  • Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  • Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, “A secure Routing Protocol for Ad hoc networks”, In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP’ 02), pp. 78-87, November 2002.
  • Alfawaer,Z. And Al Zoubi,S. , ”A Proposed Security Subsystem for Ad Hoc Networks” International Forum on Computer Science Technology and Applications,IEEE 2009
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ad Hoc Network Nodes Security Attack Malicious Behavior

Powered by PhDFocusTM