Research Article

Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s)

by  Raj Mohan Mumgai, Sandip Vijay
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Issue 4
Published: November 2012
Authors: Raj Mohan Mumgai, Sandip Vijay
10.5120/9267-3447
PDF

Raj Mohan Mumgai, Sandip Vijay . Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s). International Journal of Computer Applications. 58, 4 (November 2012), 1-5. DOI=10.5120/9267-3447

                        @article{ 10.5120/9267-3447,
                        author  = { Raj Mohan Mumgai,Sandip Vijay },
                        title   = { Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 58 },
                        number  = { 4 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/9267-3447 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Raj Mohan Mumgai
                        %A Sandip Vijay
                        %T Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET’s)%T 
                        %J International Journal of Computer Applications
                        %V 58
                        %N 4
                        %P 1-5
                        %R 10.5120/9267-3447
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc network is a heterogeneous network. They have very particular features such as high mobility, multi-hop routing, open system and the absence of any fix infrastructure. An ad-hoc network faces different type of security attack. In this paper, we discuss our implementation of the AODV protocol extension namely Malicious Node Attack Preventer (MNAP). AODV extension mechanism improves the AODV behavior. MNAP used the reserved field of RREQ and RREP packet format. MNAP implements security in AODV against black-hole and gray-hole attacks. Analyzes has been done based on PDR, throughput and delay of the node selected by doing simulation on Qualnet network simulator.

References
  • X. Hong, K. Hu and M. grela, " Scelable Routing Protocol for Mobile Ad-Hoc Networks," IEEE Networks, vol. 16 no. 4, July-Aug. 2002, pp. 11-12.
  • IETF Working Group: Mobile Adhoc Networks (manet). http://datatracker. ietf. org/wg/manet/charter/
  • Stefano Basagni, Marco Conti, Slivia Giordano and Ivan stojmenovic," Mobile Ad-hoc Networking," 2004, pp. 10-29
  • P. G. Argyoudis and D. O'Mahony," Secure Routing for Mobile Ad-hoc Networks," IEEE Commun. Surveys & Tutorial, vol. 7, no. 3, pp. 2-21
  • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," IETFRFC 3561, July 2003.
  • C. E. Perkins and E. M. Royer, "Ad Hoc On-Demand Distance Distance Vector Routing," Proc. 2nd IEEEWkspMobile Comp. Sys. and Apps. , New Orleans, LA, Feb. 1999, pp. 90–100
  • L. Gong, D. J. Wheeler, "A Matrix Key Distribution Scheme," Journal of Cryptology, 2(2), pp 51-59, 1990.
  • BalaKrishan, M. ,"Symmetric key management and distribution technique in wireless ad-hoc networks" IEEE conference publication, Pages: 727, year 2011
  • S. JabeenBeguma,*, Dr. T. Purusothaman b,1, G. Vidhya,"An Efficient Key Pre-distribution Schemefor Multiple Attacks,"Journal of Computer Applications (JCA)Volume IV, Issue 3, 2011
  • H. Shafiei, A. Mehdizadeh, A. Khonsari and M. Ould-Khaoua. A Combinatorial Approach forKey-Distribution in Wireless Sensor Networks. In Proc of the IEEE "GLOBECOM" 2008.
  • M. Ramkumar, N. Memon, "An Efficient Key Predistribution Scheme for MANET Security," submitted to the IEEE Journal on Selected Areas of Communication
  • M. G. Zapata, N. Asokan, "Securing Ad-Hoc Routing Protocols," Proceedingsof the 2002 ACM Workshop on Wireless Security (WiSe 2002),pages 1-10. September 2002.
  • Abusalah, L. ; Khokhar, A. ; Guizani, M,'A survey of secure mobile Ad Hoc routing protocols Communications Surveys & Tutorials, IEEE Volume: 10 , Issue: 4 Publication Year: 2008 , Page(s): 78 - 93
  • Megha Arya, Yogendra Kumar Jain,"Grayhole Attack and Prevention in Mobile Adhoc Network," IJCA, Volume 27– No. 10, August 2011
  • Madhusudhananaga kumarKS ,G. Aghila "A Survey on Black Hole Attacks on AODV Protocol in MANET", IJCA, Volume 34– No. 7, November 2011
  • D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks,T. Imilinski and H. Korth, Eds. Kluwer Academic Publishers, 1996.
  • Qualnet Simulator
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

AODV MNAP Non-Trustworthy Trustworthy Qualnet

Powered by PhDFocusTM