Skip to main content

An Algorithm to Detect Attacks in Mobile Ad Hoc Network

  • Conference paper
Software Engineering and Computer Systems (ICSECS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 181))

Included in the following conference series:

Abstract

Each node in Mobile Ad Hoc Network (MANETs) communicates with each other to transfer the packet to destination node. Any anomalous behaviour of a node can confine it from executing this operation and even can disturb the whole network process. Therefore, the need of monitoring the nodes arises to keep a check on the behaviour of a node. In this paper, an algorithm is proposed to monitor the nodes & to check if a node is under attack or not. Moreover, a second layer of security is added which is furnished by a testbed to monitor the nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Siva Ram Murthy, C., Manoj, B.S.: Mobile Ad Hoc Networks-Architecture and Protocols. Pearson Education, London (2004), ISBN 81-317-0688-5

    Google Scholar 

  2. Perkin, C.E.: Ad Hoc Networking. Pearson Education, London (January 2001)

    Google Scholar 

  3. Sheikhl, R., Chandee, M., Mishra, D.: Security Issues in MANET: A Review. IEEE (2010)

    Google Scholar 

  4. Rai, P., Singh, S.: A Review of MANETs Security Aspects and Challenges. IJCA Special Issue on Mobile Ad Hoc Networks (2010)

    Google Scholar 

  5. Wu, B., et al.: A Survey of Attacks and Preventions in Mobile Ad Hoc Networks, Wireless/Mobile Network Security, vol. 17. Springer, Heidelberg (2006)

    Google Scholar 

  6. Jangra, A., Goel, N., Priyanka, Bhati, K.: Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture. International Journal of Electronics Engineering, 189–196 (2010)

    Google Scholar 

  7. Sahu, S., Shandilya, S.K.: A Comprehensive Survey On Intrusion Detection In Manet. International Journal of Information Technology and Knowledge Management 2(2), 305–310 (2010)

    Google Scholar 

  8. Panos, C., Xenakis, C., Stavrakakis, I.: IEEE Fellow - A Novel Intrusion Detection System for MANETs (2009)

    Google Scholar 

  9. Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. IEEE, Los Alamitos (2003)

    Book  Google Scholar 

  10. Mamatha, G., Sharma, S.: A Highly Secured Approach against Attacks in MANETS. International Journal of Computer Theory and Engineering 2(5), 1793–8201 (2010)

    Google Scholar 

  11. Jinghua, L., Peng, G., Yingqiang, Q., Gui, F.: A Secure Routing Mechanism in AODV for Ad Hoc Networks. IEEE, Los Alamitos (2007)

    Book  Google Scholar 

  12. Jaisankar, N., Swamy, K.D.: A Novel Security Framework for Protecting Network Layer Operations in MANETs. International Journal of Engineering and Technology 1(5) (2009)

    Google Scholar 

  13. Bhargava, B., Oliveiral, R., Zhang, Y., Idika, N.: Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks. In: IEEE International Conference on Distributed Computing Systems Workshops (2009)

    Google Scholar 

  14. Barolli, L., Ikeda, M., Xhafa, F., Duresi, A.: A testbed for MANETs: Implementation, Experiences and Learned Lessons. IEEE, Los Alamitos (2010)

    Google Scholar 

  15. Li, L., Zhang, H.: Research on Designing and Implementing an Experimental MANET Testbed. In: IEEE International Conference on Communication Software and networks (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saini, R., Khari, M. (2011). An Algorithm to Detect Attacks in Mobile Ad Hoc Network. In: Zain, J.M., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22203-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22203-0_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22202-3

  • Online ISBN: 978-3-642-22203-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics