Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks

被引:0
作者
Kukreja, Deepika [1 ]
Miglani, Mohit
Dhurandher, S. K.
Reddy, B. V. R. [1 ]
机构
[1] GGSIP Univ, USICT, Delhi, India
来源
2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) | 2014年
关键词
security; penalize; Mobile Ad Hoc Networks; secure routing; routing protocols; trust; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the security. Security is a significant challenge that needs to be addressed as member or group authentication, confidentiality, data integrity and access control are strong necessities for such kind of networks. We use Dynamic Source Routing (DSR) as the principal protocol and present a method which selects the most trustworthy path between the source and destination that is free from malicious nodes. The proposed method identifies and punishes the malicious nodes inducing a variety of attacks like: malicious topology change behavior, dropping data packets, dropping control packets and packet modification.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 23 条
  • [1] [Anonymous], 1996, Mobile Computing
  • [2] A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
    Ayday, E.
    Fekri, F.
    [J]. AD HOC NETWORKS, 2010, 8 (02) : 181 - 192
  • [3] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351
  • [4] Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
  • [5] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [6] Dhurandher Sanjay K., 2009, Proceedings of the 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009), P189, DOI 10.1109/ACT.2009.55
  • [7] FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems
    Dhurandher, Sanjay K.
    Obaidat, Mohammad S.
    Verma, Karan
    Gupta, Pushkar
    Dhurandher, Pravina
    [J]. IEEE SYSTEMS JOURNAL, 2011, 5 (02): : 176 - 188
  • [8] Halim ITA, 2010, I C WIREL COMM NETW
  • [9] Hu Y., 2002, PROC 8 ACM INT C MOB, P12
  • [10] Huang Chuanhe, 2007, IET Conference on Wireless, Mobile and Sensor Networks 2007 (CCWMSN07), P406, DOI 10.1049/cp:20070170