Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Daxing WANG
Pages - 1 - 7 | Revised - 15-05-2013 | Published - 30-06-2013
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Ad Hoc Network, Malicious Node, Detection, Sybil Attacks, Sinkhole Attacks, Security.
ABSTRACT
With the popularity of intelligent electronics which rely on wireless communication in the post-PC
era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily
lives. Construction of wireless ad hoc network becomes more and more convenient. However, the
deployment of sensor nodes in an unattended environment makes the networks vulnerable to a
variety of potential attacks. We present a malicious node detection mechanism. In using a
monitoring mechanism to detect suspicious behavior, and on the basis of the responses from
other monitoring nodes, if the number of suspicious entries concerning a particular node reaches
a set threshold, that node is declared malicious. The simulation results show that the time it takes
to detect a malicious node is decreased when there are more nodes in the network, and that it
provides a fast and efficient way to detect malicious nodes.
1 | Sonekar, S. V., & Kshirsagar, M. M. (2016). Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 317-328). Springer India. |
2 | Hashemnejad, R., & Purushothaman, K. Wireless ad hoc networks:malicious nodedetection. |
Aamir Shahzad, “Cryptography and authentication placement to provide secure channel for SCADA communication”, International Journal of Security, Vol. 6 (3): 28- 44, 2012. | |
Jilong XUE, Xiaogang QI, Chenyu WANG. “An Energy-Balance Routing Algorithm Based on Node Classification for Wireless Sensor Networks”. Journal of Computational Information Systems, Vol. 7 (7): 2277- 2284, 2011. | |
Junior, W., Figueiredo, T. and Wong, H. “Malicious node detection in wireless sensor networks”. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04), April 26-30, 2004, Santa Fe, New Mexico. | |
Loanis, K. and Dimitrou, T. “Towards intrusion detection in wireless sensor networks”. In Proceedings of the 13th European Wireless Conference, April 1-4, 2007, Paris, France. | |
M. Palomera-Perez, H. Benitez-Perez and J. Ortega-Arjona, “Coordinated Tasks: A Framework for Distributed Tasks in Mobile Area Networks”, ICIC Express Letters, Volume 5,Issue 8(B), pp.3941-3946, 2011.pp.2817-2824,2011. | |
Marti, S., T. J., Lai, K. and Baker, M. “Mitigating routing misbehavior in mobile ad hoc networks”. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000) August 6-11, 2000, Boston, USA. Boston, MA, ACM Press,pp. 255-265. | |
Mustafa Fayomi, “An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks”. International Journal of Security, Vol. 5 (1): 35- 61, 2011. | |
Patrick S. Chen, Shing-Han Li and Yung-Kuei Liu, “Scheduling the Access to Multi-Level Secure Databases in a Wireless Network Environment”, International Journal of Innovative Computing, Information and Control (IJICIC), vol.6, no. 12,pp.5381-5404, 2011. | |
Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, “An Acquisitional Query Processing System for Sensor Networks”. ACM Trans. Database Syst., 30(1):122–173, 2005. | |
Xueyan Tang and Jianliang Xu. “Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks”. IEEE/ACM Trans. 16(4):904–917, 2008. | |
Yiliang Han, Xiaolin Gui and Xuguang Wu, “Parallel Multi-Recipient Signcryption for Imbalanced Wireless Networks”, International Journal of Innovative Computing, Information and Control (IJICIC), vol.6, no.8,pp.3521-3630, 2010. | |
Yingqi Xu, Tao-Yang Fu, Wang-Chien Lee, “Processing k nearest neighbor queries in locationaware sensor networks”. Signal Processing, 87(12):2861–2881, 2007. | |
Dr. Daxing WANG
School of Mathematical Sciences, Chuzhou University No.1528, Feng-Le Road, Chuzhou, 239000?Anhui, P.R. - China
starleewipm@126.com
|
|
|
|
View all special issues >> | |
|
|