Skip to main content

Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens

  • Conference paper
Communication and Networking (FGCN 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 120))

  • 968 Accesses

Abstract

A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Papadopoulos, K., Zahariadis, T., Leligou, N., Voliotis, S.: Sensor networks security issues in augmented home environment, pp. 1–4 (2008)

    Google Scholar 

  2. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  3. Zhou, L., Haas, Z.: Secure ad hoc networks. IEEE Network Magazine 13, 14–30 (1999)

    Google Scholar 

  4. Jacobs, S., Corion, M.S.: Wnet authentication architecture. Internet draft (1999)

    Google Scholar 

  5. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Radio and Wireless Conference: RAWCON 2003, pp. 75–78 (2003)

    Google Scholar 

  6. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: International Conference on Mobile Computing and Networking, pp. 275–283 (2000)

    Google Scholar 

  7. Chang, B.: Markov chain trust model for trust-value analysis and key management in distributed multicast manets. IEEE Transactions On Vehicular Technology 58 (2009)

    Google Scholar 

  8. Yang, H., Shu, J., Meng, X., Lu, S.: Scan: Self-organized network layer security in mobile ad hoc networks. IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks 24, 262–273 (2006)

    Google Scholar 

  9. Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks  13, 78–87 (1999)

    Google Scholar 

  10. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: International Conference on Network Protocols, pp. 251–260 (2001)

    Google Scholar 

  11. Papadimitratos, P., Hass, Z.: Secure data communication in mobile ad hoc networks. IEEE Network Magazine 24, 343–356 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandrakant, N., Shenoy, P.D., Venugopal, K.R., Patnaik, L.M. (2010). Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17604-3_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17603-6

  • Online ISBN: 978-3-642-17604-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics