Open Access   Article Go Back

Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model

S.Madhurikkha 1 , C.Meenu Kumari2 , S.Revathi 3 , P.Nathiya 4

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-3 , Page no. 72-177, Mar-2015

Online published on Mar 31, 2015

Copyright © S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya, “Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.72-177, 2015.

MLA Style Citation: S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya "Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model." International Journal of Computer Sciences and Engineering 3.3 (2015): 72-177.

APA Style Citation: S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya, (2015). Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model. International Journal of Computer Sciences and Engineering, 3(3), 72-177.

BibTex Style Citation:
@article{Kumari_2015,
author = {S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya},
title = {Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {72-177},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=443},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=443
TI - Preventing Packet Dropping Attack in Ad hoc Networks Using Malicious node Isolation Model
T2 - International Journal of Computer Sciences and Engineering
AU - S.Madhurikkha, C.Meenu Kumari, S.Revathi , P.Nathiya
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 72-177
IS - 3
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2431 2345 downloads 2530 downloads
  
  
           

Abstract

Securing ad hoc network is one of the trending issues that is going on in the networking industry which has lead to the development of various algorithms and methods for identifying intrusions. Intrusions are of various types namely packet forwarding attack, black hole, sequence numbers etc., there are still so many such intrusions that are taking place. The proposed project is to study the impact of a malicious node in the ad hoc network. The proposed system uses MNI-AODV algorithm by using malicious node isolation(MNI) method. In this paper methods against malicious node is implemented by introducing MNI-AODV in the ad hoc network [7]. The impact of nodes in the presence of packet dropping attack is also presented.

Key-Words / Index Term

Network Security, Malign nodes, ad hoc and network attacks, ns2

References

[1] C.Siva Ram Murthy and B.S.Manoj, “Ad hoc Wireless Networks”, Pearson Publication ,2005.ISBN 81-297-0945-7
[2] C.K.Toh, “Adhoc Mobile wireless networks: Protocols and Systems”, Prentice Hall ,New Jersy,2002.

[3] Umang, Reddy B.V.R and Hoda M. N., “Enhanced IDS in Adhoc routing protocol using minimal energy Consumption”, ISSN-1751-8628, DOI: 10.1049/iet-com.2009.0616, IEE Journal Communications IET, Volume 4, Issue 17, Nov, 2010 (Impact Factor- 0.963)

[4] Umang, Reddy B.V.R and Hoda M. N., “GNDA: Detecting Good Neighbor nodes in Adhoc Routing Protocol”, ISSN 978-0-7695-4329-1/11/$26.00©IEEE, DOI: 10.1109/EAIT.2011.62, IEEE EAIT 2011, pp no 235-238.Feb 19-20, 2011

[5] Umang, Reddy B.V.R and Hoda M. N., “Vulnerability of Numerous Black Hole Nodes in Mobile Ad hoc Networks-Problem”, IEEE International Advance Computing Conference”, ISBN: 978-981-08-2465-5© IEEE , March, 2009.

[6] Umang, Reddy B. V. R and Hoda M. N; “Impact of malicious nodes in mobile adhoc networks using AODV routing, National Conference on “Advances in Wireless Cellular Telecommunications: Technologies and Services”, organized by Institution of Communication Engineers and Information Technologists (ICEIT) Delhi, 14th -15th April, 2011.
[7] Umang,Dr. B V. R. Reddy and Dr. M .N. Hoda “MNI-AODV: Analytical Model for attack mitigation using AODV routing in ad hoc networks”, 2014 International Conference on Computing for Sustainable Global Development (INDIACom)
[8] Muhammad Zeshan , Shoad A. khan’Adding Security Against packet dropping Attack in Mobile Ad hoc Networks’, Proceedings of ACM International Seminar on Future Information Tech & Mgmt Engg (FITME 2008).
[9] Jaydip Sen , Girish Chandra. P ’A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks’, Proceedings of IEEE International conference on Telecommunication(2007).
[10] Sirisha R. Medidi, Muralidhar Medidi & Sireesh Gavini’Detecting Packet-dropping Faults in Mobile Ad-hoc networks’, IEEE 2003.
[11] S.Marti,T.Giuli,k.Lai,and M.baker,”Mitigating routing misbehaviour in mobile ad hoc networks”,proceedings of international conference on mobile computing and networking,AUG 2000.
[12] Bhalaji .N & Dr. Shanmugam .A,’Reliable Routing Against Selective Packet Drop Attack in DSR Based MANET’, Journal of Software 2009.
[13] K.liu.J.Deng, P.Varshney, K.balakrishnana, ” An acknowledgment based approach for the detection of routing misbehaviour in MANETs”, IEEE Transaction on mobile computing ,2007