Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Impact of Malicious Node in MANETs

Print
PDF
IJCA Special Issue on International Conference on Reliability, Infocom Technology and Optimization
© 2013 by IJCA Journal
ICRITO
Year of Publication: 2013
Authors:
Anshu Chaturvedi

Anshu Chaturvedi. Article: Impact of Malicious Node in MANETs. IJCA Special Issue on International Conference on Reliability, Infocom Technology and Optimization ICRITO:41-44, August 2013. Full text available. BibTeX

@article{key:article,
	author = {Anshu Chaturvedi},
	title = {Article: Impact of Malicious Node in MANETs},
	journal = {IJCA Special Issue on International Conference on Reliability, Infocom Technology and Optimization},
	year = {2013},
	volume = {ICRITO},
	pages = {41-44},
	month = {August},
	note = {Full text available}
}

Abstract

MANETs are known to possess unique and many vulnerable features. In such a case, security is again another crucial issue to be tackled. The attacks can affect the performance of the network critically. This paper therefore proposes a solution for maintain the optimum performance of the network even in presence of malicious nodes by modifying the existing DSR protocol. The simulation is performed in NS-2. The results of the scheme show that the network performance is not affected and proposed solution handles it well.

References

  • L. Zhou, Z. J. Haas, Cornell Univ. , "Securing ad hoc networks," IEEE Network, Nov/Dec 1999, Volume: 13, Page(s): 24-30, ISSN: 0890-8044
  • J. -P. HuBaux, L. Buttyan, and S. Capkun. , "The quest for security immobile ad hoc network," In Proc. ACM MOBICOM, Oct. 2001.
  • J. Kong et al. , "Providing robust and ubiquitous security support for mobile ad-hoc networks," In Proc. IEEE ICNP, pages 251–260, 2001
  • S. Yi, P. Naldurg and R. Kravets, "Security-Aware Ad Hoc Routing for Wireless Networks", In Proceedings of ACM MOBIHOC 2001, pp. 299-302, October, 2001.
  • H. Deng, W. Li, Agrawal, D. P. , "Routing security in wireless ad hoc networks," Cincinnati Univ. , OH,USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804
  • H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume- 11, Page(s): 38- 47, ISSN: 1536-1284
  • Panos,C Xenakis,C and Stavrakakis,I - A Novel Intrusion Detection System for MANETs International Conference on Security and Cryptography (SECRYPT) 2009.
  • Orda, A. and Libman, N. The designers' perspective to atomic noncooperative networks. IEEE/ACM Transactions on Networks, 7(6) pp. 875-884, 1999.
  • Qiu, L. Yang, Y. R. Zhang, Y. and Shenker, S. On selfish Routing in internet like environments. In Proceedings of ACM SIGCOMM'03, Aug 2003.
  • Roughgarden, T. The price of anarchy is independent of the network topology. In Proceedings of the 34th Annual ACM Symposium on the Theory of Computing, 2002.
  • Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Adhoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  • Kimaya Sanzgiti, Bridget Dahill, Brian Neil Levine, Clay shields, Elizabeth M, Belding-Royer, "A secure Routing Protocol for Ad hoc networks", In Proceedings of the 10thIEEE International Conference on Network Protocols (ICNP' 02), pp. 78-87, November 2002.
  • Alfawaer,Z. And Al Zoubi,S. , "A Proposed Security Subsystem for Ad Hoc Networks" International Forum on Computer Science Technology and Applications, IEEE 2009. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  • Sahu, S and Shandilya, S K - A Comprehensive Survey On Intrusion Detection In Manet, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 305-310July-December 2010.