Research Article | OPEN ACCESS
Repeated Node Taxonomy Method for Intrusion Detection in Mobile Ad Hoc Network
1R. Saravanan and 2E. Ilavarasan
1Department of Computer Science and Engineering, Manomaniam Sundaranar University and Saveetha Engineering College, Tamil Nadu
2Department of Computer Science and Engineering, Pondicherry Engineering
College, Puducherry, India
Research Journal of Applied Sciences, Engineering and Technology 2015 4:277-281
Received: August 01, 2014 | Accepted: September 13, 2014 | Published: February 05, 2015
Abstract
The vital aim of the proposed node taxonomy method in Mobile Ad hoc Network (MANET) is to prevent the normal or good nodes present in the network from some infected nodes. The tainted individual nodes present in the network may affect the normal unaffected nodes in the network. To overcome that, this study proposes a novel node taxonomy method which uses the adjacency matrix. The entries in the adjacency matrix are the link strength between the nodes. The concept behind the proposed method, the node which is connected with super threshold number of known adversaries is classified as adversary. As the link between the mobile nodes changes dynamically, the node taxonomy algorithm should be executed recursively to filter out the malicious node in the network. The proposed taxonomy method has low computational cost and consumes less energy for detecting the malicious node. The proposed method is evaluated by using the Network Simulator (NS2).
Keywords:
Energy, link strength, malicious node, Mobile Ad Hoc Network (MANET) , performance analysis,
References
-
Bose, S., Bharathimurugan, S. and A. Kannan, 2007. Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks. Proceeding of the International Conference on Signal Processing, Communications and Networking, pp: 360-365.
CrossRef
-
Esfandi, A., 2010. Efficient anomaly intrusion detection system in adhoc networks by mobile agents. Proceeding of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 7: 73-77.
CrossRef
-
Marchang, N. and R. Tripathi, 2007. A game theoretical approach for efficient deployment of intrusion detection system in mobile ad hoc networks. Proceeding of the International Conference on Advanced Computing and Communications. Assam, pp: 460-464.
CrossRef
-
Paramasiva, B. and K.M. Pitchai, 2013. Modeling intrusion detection in mobile ad hoc networks as a non cooperative game. Proceeding of the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp: 300-306.
CrossRef
-
Peyman, K. and A. Mehran, 2011. Feature analysis for intrusion detection in mobile ad-hoc networks. Int. J. Netw. Secur., 12(1): 42-49.
-
Shahnawaz, H., S.C. Gupta and C. Mukesh, 2011. Denial of service attack in AODV & friend features extraction to design detection engine for intrusion detection system in mobile adhoc network. Proceeding of the 2nd International Conference on Computer and Communication Technology (ICCCT, 2011). Allahabad, pp: 292-297.
CrossRef
-
Srinivasan, V., P. Nuggehalli, C.F. Chiasserini and R.R. Rao, 2003. Cooperation in wireless ad hoc networks. Proceeding of the IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM), 2: 808-817.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|