SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
470
Malicious Nodes and its defending mechanisms in
Wireless Adhoc Network
Madhavi Dhingra
Department of Computer Science and Engineering, Amity University Madhya Pradesh, Maharajpura Dang,
Gwalior (MP)-474005
Email: madhavi.dhingra@gmail.com
Abstract-Maintaining Security in the wireless networks is a major concern of issue in todays era. Many ap-
proaches are suggested and implemented such as VPN, Personal Area networks and Firewall.But each of the
techniques have some or other issues due to which it wont be called as effective and efficient technique. In wire-
less network, security is not only done within the connections over the network, but its also important to do on
the nodes separately. The networks and the nodes must be monitored for the particular set of selected metrics and
on the basis of it, further actions can be planned for it. Nodes can behave in malicious manner and disturb the
working of the network. This paper covers the vulnerabilities in the wireless ad hoc mobile network due to which
malicious nodes effect the network. It also highlights the major preventive mechanisms that have been developed
to avoid the malicious nodes.
Index Terms-Malicious Node; Intrusion Detection;Intrusion Prevention;Wireless Mobile Adhoc network
1. INTRODUCTION
Wireless networks are commonly used in all the IT
infrastructures for sharing and retrieving useful infor-
mation. Mobile ad hoc networks play a major role in
establishing connected networks. MANET is com-
monly used and popular as either with or without in-
frastructure.
Mobile adhoc network is a temporary network that
contains multiple number of wireless mobile
nodes.MANET uses the multiple node approach to
transmit the messages between nodes in the network.
Nodes can be the source node, destination node or
even an intermediate node that simply transfers the
packets to another destination. Nodes can enter and
exit the network whenever they want. The structure
and organization of the nodes in the network vary
from time to time due to mobility of nodes within and
outside the network. Each node is responsible for
sending the data to other nodes and have their own
approach regarding rules and protocols for data trans-
mission. The routes and the routing protocols need to
be updated from time to time due to dynamic envi-
ronment of the network. All nodes in the network
share information with each other and cooperate to
perform the desired task. This network does not have a
central accessing point like the wired networks.
2. NEED OF SECURITY IN AD HOC
NETWORK
Mobile ad-hoc networks have few vulnerabilities due
to which attackers can easily enter into the network.
An attacker take advantage of these weaknesses and
violate the security of the network. these vulnerabili-
ties are as follows [1] -
1. Mobility feature of Adhoc network - the nodes in
the network are mobile in nature. They can enter
and exit the network whenever they wish. This is
the biggest problem in the network. This will gen-
erate the opportunity for the attacker to enter into
the network and have all the information about the
network.
2. Open Wireless connection - A wireless connection
is fast but less secure than the wired connection.
The attacker can easily access the network and take
advantage of it.
3. Limited Resource constraints - Nodes of the wire-
less network have limited amount of resources like
bandwidth, battery, etc. Thus intruder can waste
these resources after entering the network and
make them unavailable for intended users.
4. Dynamic Network Structure - The movement of
nodes inside and outside the network makes a dy-
namic structure of the network. The transmission
of packets follow different routes each time a node
enter or exit the network. There is no definite static
path for it. Thus, an attacker can easily make its
way to enter the selected route in order to disturb
the network.
5. Scalability - Adhoc network has no limitation on
the number of nodes. This feature gives the attack-
er an advantage tented the network without any re-
striction.
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
471
6. Limited Range - Adhoc network works in limited
range, due to which all the nodes must be in that
range for doing communication.
7. Quality of Service - A network performance de-
pend on the quality of service provide by it. Mali-
cious node can easily affect this factor by perform-
ing several kinds of attacks.
The security principles must be maintained by the
networking system to have successful and error free
operations. Security is a broad area which encom-
passes the following major parameters to ensure the
working of a particular system[2].
• Confidentiality - All the communications that are
done between the different systems in the network
must preserve the confidentiality of the messages
and the identity of the communicating nodes.
• Integrity - The originality of the message must be
secured during transmission of the packets.
• Availability - The message and data must be avail-
able to the genuine intended users that require it.
• Authenticity - Only authentic users have access to
the system and its resources. The authentication
process identifies the validity of the user that wants
to gain the access to the resources.
• Non Repudiation - The sender and the destination
must not deny the transmission of packets sent by
them.
3. NEED OF SECURITY IN AD HOC
NETWORK
The Mobile ad hoc networks have two kinds of nodes
based on their behaviour [3]-
1. Normal node - A node that performs the task ac-
cording to the defined protocol and maintains the
security of the network is considered as a normal
node.
2. Malicious node - A node which violates any of the
security principles is known as malicious node.
Such node can affect the network adversely there-
by degrading the performance of the network.
Thus several algorithms have been used for identi-
fication and removal of the malicious node. Mali-
cious or susceptible behavior can be of several
kinds like packet drop, battery drained, bandwidth
consumption, linkage problem, denial of re-
sources, modification of data, insertion of dupli-
cate packets etc.
A normal node maintains and follow all the securi-
ty principles. Malicious nodes act as normal nodes in
the network and violate the security parameters in
active or passive manner. Malicious behaviour has
several forms which are explained below [1]-
1. A malicious node captures the packet that are
transferred in the network and drops it so that it
never reaches the original destination.
2. A malicious node can waste the power of the bat-
tery by performing unnecessary tasks like holding
the network data for long, sending the duplicate
data etc.
3. A node can fill the network with abnormal data so
that normal data cannot be transferred.
4. A malicious node tries to hold the bandwidth of
the network by continuously engaging it and
denying the use of the legitimate nodes.
5. A malicious node can disturb the network without
giving any authentic details.
6. The malicious node can enter duplicate fake pack-
ets so as disturb the network.
7. Any malicious node can intentionally delay the
packet before sending it in the network.
8. The linkage between the nodes can be broken
which will affect the communication between the
nodes.
9. The packet data can be modified by the malicious
nodes.
10. The malicious node can forge the existing routes
by creating new fake routes so as to send the
packets on wrong paths.
11. An attacker node can make the node isolated
while making delays in its path so that The source
node selects another path to send the packets.
12. A malicious node can store al the information
about the transfer of packets for future attack.
13. A malicious node can hack the session between
the two genuine nodes thereby stealing the infor-
mation and disturbing the communication process.
4. ATTACKS DUE TO MALICIOUS NODES
The presence of malicious nodes introduces internal
attacks. These internal attacks are type of active attack
as they disrupt the message and the network directly.
Misbehaving nodes are difficult to detect as they are
also part of the network. These attacks are done at
network, transport and application layer of the net-
work. These attacks include [3,4]-
1. Wormhole attack: The malicious node creates a
tunnel between the far nodes by creating an illu-
sion that they are neighbouring nodes and thus it
affects the choice of the path for data transmission
which will not involve honest nodes.
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
472
2. Byzantine attack: This attack is done by a com-
promised node that create attacks by performing
certain tasks like creating a loop in the routing,
dropping the packets, and sending the packets on
non efficient paths over the network. This category
of attack is difficult to find out as all the nodes
look normal in this kind of network.
3. Resource consumption attack: In this attack, the
attacker waste the limited resources of the network
so that genuine users cannot utilise it.
4. Manipulation of data: One simple attack is modifi-
cation of the data which is done by malicious
nodes.
5. Grey hole attack: An intruder broadcast the infor-
mation that it is having shortest distance to the des-
tination which result in rerouting of the path to
send the packets. The invalid path will result in un-
successful transmission of data.
6. Eclipse attack: The malicious node divide the net-
work into multiple partition and monitors the data
flowing between the partitions. It can also control
the data flowing between the networks.
7. Session attack: The attacker can take over the con-
trol of the session once the session authentication
is over. The malicious node can obtain the confi-
dential information and use the information for
performing other attacks.
8. Jamming attack: The malicious node will jam the
network so that the sender cannot send the data
packets and the receiver cannot receive the pack-
ets. The network is flooded by unnecessary data so
as to flood the overall network.
9. Routing attack: Attacks related to routing protocol
are routing attacks. These are routing table over-
flow, routing table poisoning, packet replication,
route cache poisoning, rushing attack.
5. DEFENSIVE TECHNIQUES
IMPLEMENTED
Many researchers have focused on this problem and
invented some mechanisms to deal with the problem.
Vidhya.K has implemented collaborative contact
based watchdog technique for identification of he ma-
licious node and isolation of it from the network[6].
The secure route is selected by choosing the normal
nodes of the network. This mechanism is an improved
version of watchdog technique. In general, the watch-
dog technique observes the time of sending packets
and storing packets and if the former is more than lat-
ter then it gives a warning to the network that the re-
spective node is malicious. This technique also does
not work for large umber of nodes. The improved ver-
sion works for larger number of nodes as well as it can
match with the movement of the nodes within the
network. The problem of false node detection is also
solved by this method. Apart from all the advantages,
the approach has some limitations like its working
process is not that fast at the time of network conges-
tion due to which packets start dropping.
Nidhi Lal has given another technique to improve the
watchdog technique by adding the destination se-
quenced distance vector routing protocol that gives
more secure route[7]. It is known as I-watchdog which
is helpful in avoiding DoS attack as well as congestion
over the network. The process has two phases, First
phase involves authenticating the nodes that are send-
ing the updated information of the routes. In second
phase, the nodes will analyse the working and events
of the other working nodes. If the events were differ-
ent from the prescribe events, then that node is de-
clared as malicious. The main drawback of this mech-
anism is that it generates false alarm for malicious
nodes and don’t support any other routing protocol
other than distance vector routing protocol.
Sruthi R and Vijayakumar have given a trust based
mechanism for detection and removal of malicious
nodes[8]. This method depends on the calculated val-
ue of trust and the reputation value of the nodes and
identify the malicious nodes. There are three modules,
monitor module, trust module and reputation module.
Monitor module collects the information regarding the
neighbouring nodes, trust module rate the behaviour
of the nodes and reputation module analyse the trust
value and reputation value of the nodes and determine
the misbehaving nodes. The report of the malicious
nodes are sent to the network so as to remove those
nodes from the network. The normal reputation value
and trust value has been predefined by the system. If
any neighbouring node trust value or reputation value
comes below the predefined value, then alert is sent
for the corresponding node. This approach considers
all the aspects of the node but it consume a large
amount of time.
Chinthanai Chelvan,K. had proposed EAACK, an
intrusion detection system to improve the security of
the network by using the watchdog improved version
to detect and eliminate the abnormal nodes whenever
such report is received[9]. This approach has two
modules Secure acknowledgement and misbehaviour
report authentication(MRA). Both modules perform
their specific responsibility.
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
473
The secure acknowledgement (s-ack) approach solves
the problem of failing to detect the malicious nodes in
case of receiver collision. The network makes the
group of three nodes, where third node is responsible
for sending the s-ack to the first node, this process
ensures the safe network without collision. If the first
node dint receive the s-ack until the specified limit of
time, then it declare the receiver collision.The MRA
part solves the watchdog problem where malicious
nodes are not detected due to false acknowledgement
report. In this case, the malicious node itself sends the
acknowledgement report. The report is checked by the
algorithm to verify that the packets sent were received
by the genuine destinations. By verifying it, the validi-
ty of the acknowledgement report can be determined.
Mamatha S. and A.Damodaran provided the method
for detecting and isolating malicious node by using an
anomaly based IDS that monitors the node behavior to
avoid the occurrence of the attacks[10]. Data trans-
mission quality function is used for identification of
normal nodes with malicious nodes. IDS agent is the
major module that checks on each node of the net-
work. This agent has four separate modules. The first
module data collection module collects the infor-
mation of each node and computes the quality of data
transfer for them in the network. The intrusion detec-
tion module takes the information of data collection
module and verify it with the standard values, if it
does not matches, then the corresponding node is
termed as malicious. The voting module will verify
whether the malicious node is really malicious or it is
falsely detected. This module take the votes of the
other nodes which can confirm the misbehaviour. Af-
ter the node is confirmed as malicious, the last module
segregation removes the node from the network.
This mechanism has an advantage of no communica-
tion overhead. The drawback is that this approach can
only be performed with Adhoc on demand distance
vector algorithm due to which it can prevent very few
attacks.
Vijayakumar 2015 had given a Reputed packet deliv-
ery approach that involved audit misbehaviour detec-
tion and monitoring method[11]. The main task of this
method was to detect and remove the malicious node
from the mobile ad hoc networks. The node behaviour
is monitored for each packet transferred over the net-
work. Misbehaviour node’s detection and prevention
is done within the following three major parts audit
monitoring, reputation and route discovery. The sys-
tem evaluates the reputation among nodes in the net-
work. Each node has its own view over the other node
in the network. The first and second hand information
are used to evaluate the reputation of each node and
then according to the result from the evaluation the
node is determined to be the misbehaviour node or a
legitimate node. Once misbehaviour node is identified,
then enhance the additive increase/multiplicative de-
crease principle is used to isolate them from active
path.
Anitha G. and Hemlatha. M. have used the approach
of sending the ID of the malicious nodes to all the
existing nodes over the network[12]. This approach
helped in intrusion prevention and message authenti-
cation in the network.
ThirumalaSelvi.V. and ThomsonFredrik,E.J., have
provided an on-demand distributed protocol for de-
termining malicious node in ad hoc network[13].
They have also used AODV routing protocol for secu-
rity of nodes in the network.
Apart from these, several other intelligent defence
mechanisms have also been implemented.
6. DEFENSIVE TECHNIQUES
IMPLEMENTED
Mobile Ad-hoc wireless networks has been dealing
with several security problems from last few years.
One of the major area of research is in identification
and removal of malicious nodes. Various techniques
have been developed till now which are working on
different concepts. Every technique has its own bene-
fits and limitations. This paper has covered various
defence techniques for determining the malicious
nodes and removing them. There is still lot of scope of
research in this area
REFERENCES
[1] Saini Radhika; Khari Manju.(2011): Defining
Malicious Behavior of a Node and its Defensive
Methods in Ad Hoc Network, International jour-
nal of computer application, Vol 20, issue 4, pp
18-21.
[2] Jangra1; A. Goel; N. Priyanka; Bhati,K. (2010):
Security Aspects in Mobile Ad Hoc Networks
(MANETs): A Big Picture, International Journal
of Electronics Engineering, pp 189- 196.
[3] Abhay kumar Rai; Rajiv Ranjan Tewari; Saurabh
Kant Upadhyay (2010): Different types of attacks
on integrated MANET- internet communication,
International Journal of computer science and se-
curity, vol 4, issue 3, pp 265-275.
[4] Vidhya.S.V.; Deepa A.J( 2014): A survey on se-
curing MANETS from malicious behaviour by
detection mechanism, International journal of
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
474
computer science and information technologies,
Vol 5, issue 10, pp 969-977.
[5] Sibomana Fabrice; Dr. E.J.Thomson Fredrik
(2017):Detection And Prevention of Malicious
Node Based on Node Behaviour in MANET, In-
ternational Journal of Advanced Research in
Computer Science, Vol. 8, No. 9, pp 774-777.
[6] Vidhya. K.; Sundhar. U; Anantharaj. B (2016)
:Detection of Node Activity and Selfish & Mali-
cious Behavioural Patterns Using Watch Dog-
Chord Algorithm, International journal of emerg-
ing technology in computer science and electron-
ics, Vol 23, issue 1, pp 22-30.
[7] Nidhi Lal; Kumar Shishupal; Saxena Aditya;
Chaurasiya Km. Vijay (2015): Detection of Mali-
cious Node Behaviour Via I-Watchdog Protocol
in Mobile Ad hoc Network With DSDV Routing
Scheme, International conference on Advances in
Computing, Communication and Control, Vol 49,
pp 264-273.
[8] Sruthi R.;Vijayakumar R. (2014): Prevention of
MANETS from Malicious Node Attacks, Interna-
tional Journal of Computer Applications, Vol 112,
issue 14, pp 23-25.
[9] Chinthanaichelvan K.; Sangeetha T.; Prabakaran
V.; Saravanan D. (2014): EAACK-A Secure In-
trusion Detection System for MANET”, Interna-
tional journal of Innovative Research in Computer
and Communication Engineering, Vol 2, issue 4,
pp 3860-3866.
[10]Mamatha S.; Damodaram A. (2014): Intrusion
Detection System for Mobile Ad hoc Networks
Based on the Behaviour of Nodes, International
Journal of Grid Distribution Computing, Vol 7,
issue 6, pp 241-256.
[11]Vijayakumar. A; Selvamani K; Pradeep Kumar
Arya (2015): Reputed Packet Delivery Using Ef-
ficient Audit Misbehaviour Detection and Moni-
toring Method in Mobile Ad hoc Networks, Inter-
national Conference on intelligent Computer,
Communication and Convergence, Vol 48, pp
489-496.
[12]Anitha G; Hemalatha (2014): Intrusion Preven-
tion and Message Authentication protocol(IMAP)
Using Region Based Certificate Revocation List
Method in Vanet ,International journal of Engi-
neering and Technology, Vol 6, issue 2, pp 663-
672.
[13]Thirumalai V. Selvi; Thomson Fredrick E.J
(2016) : Secure on Demand Distributed Protocol
for Spontaneous Wireless ad hoc network, Inter-
national Journal of Computer Science and Infor-
mation Technology & Security, Vol 6, issue 6, pp
21-24.

More Related Content

What's hot

Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetijwmn
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networkseditor1knowledgecuddle
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksIRJET Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)IRJET Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
 

What's hot (18)

Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
A comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manetA comparative study on different trust based routing schemes in manet
A comparative study on different trust based routing schemes in manet
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
G011123539
G011123539G011123539
G011123539
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
T04506110115
T04506110115T04506110115
T04506110115
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 

Similar to Paper id 71201996

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET Journal
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc NetworkCourtney Esco
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 

Similar to Paper id 71201996 (20)

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
N0363079085
N0363079085N0363079085
N0363079085
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
1705 1708
1705 17081705 1708
1705 1708
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
E0432933
E0432933E0432933
E0432933
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 
D0961927
D0961927D0961927
D0961927
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc Network
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 

More from IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Paper id 71201996

  • 1. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 470 Malicious Nodes and its defending mechanisms in Wireless Adhoc Network Madhavi Dhingra Department of Computer Science and Engineering, Amity University Madhya Pradesh, Maharajpura Dang, Gwalior (MP)-474005 Email: madhavi.dhingra@gmail.com Abstract-Maintaining Security in the wireless networks is a major concern of issue in todays era. Many ap- proaches are suggested and implemented such as VPN, Personal Area networks and Firewall.But each of the techniques have some or other issues due to which it wont be called as effective and efficient technique. In wire- less network, security is not only done within the connections over the network, but its also important to do on the nodes separately. The networks and the nodes must be monitored for the particular set of selected metrics and on the basis of it, further actions can be planned for it. Nodes can behave in malicious manner and disturb the working of the network. This paper covers the vulnerabilities in the wireless ad hoc mobile network due to which malicious nodes effect the network. It also highlights the major preventive mechanisms that have been developed to avoid the malicious nodes. Index Terms-Malicious Node; Intrusion Detection;Intrusion Prevention;Wireless Mobile Adhoc network 1. INTRODUCTION Wireless networks are commonly used in all the IT infrastructures for sharing and retrieving useful infor- mation. Mobile ad hoc networks play a major role in establishing connected networks. MANET is com- monly used and popular as either with or without in- frastructure. Mobile adhoc network is a temporary network that contains multiple number of wireless mobile nodes.MANET uses the multiple node approach to transmit the messages between nodes in the network. Nodes can be the source node, destination node or even an intermediate node that simply transfers the packets to another destination. Nodes can enter and exit the network whenever they want. The structure and organization of the nodes in the network vary from time to time due to mobility of nodes within and outside the network. Each node is responsible for sending the data to other nodes and have their own approach regarding rules and protocols for data trans- mission. The routes and the routing protocols need to be updated from time to time due to dynamic envi- ronment of the network. All nodes in the network share information with each other and cooperate to perform the desired task. This network does not have a central accessing point like the wired networks. 2. NEED OF SECURITY IN AD HOC NETWORK Mobile ad-hoc networks have few vulnerabilities due to which attackers can easily enter into the network. An attacker take advantage of these weaknesses and violate the security of the network. these vulnerabili- ties are as follows [1] - 1. Mobility feature of Adhoc network - the nodes in the network are mobile in nature. They can enter and exit the network whenever they wish. This is the biggest problem in the network. This will gen- erate the opportunity for the attacker to enter into the network and have all the information about the network. 2. Open Wireless connection - A wireless connection is fast but less secure than the wired connection. The attacker can easily access the network and take advantage of it. 3. Limited Resource constraints - Nodes of the wire- less network have limited amount of resources like bandwidth, battery, etc. Thus intruder can waste these resources after entering the network and make them unavailable for intended users. 4. Dynamic Network Structure - The movement of nodes inside and outside the network makes a dy- namic structure of the network. The transmission of packets follow different routes each time a node enter or exit the network. There is no definite static path for it. Thus, an attacker can easily make its way to enter the selected route in order to disturb the network. 5. Scalability - Adhoc network has no limitation on the number of nodes. This feature gives the attack- er an advantage tented the network without any re- striction.
  • 2. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 471 6. Limited Range - Adhoc network works in limited range, due to which all the nodes must be in that range for doing communication. 7. Quality of Service - A network performance de- pend on the quality of service provide by it. Mali- cious node can easily affect this factor by perform- ing several kinds of attacks. The security principles must be maintained by the networking system to have successful and error free operations. Security is a broad area which encom- passes the following major parameters to ensure the working of a particular system[2]. • Confidentiality - All the communications that are done between the different systems in the network must preserve the confidentiality of the messages and the identity of the communicating nodes. • Integrity - The originality of the message must be secured during transmission of the packets. • Availability - The message and data must be avail- able to the genuine intended users that require it. • Authenticity - Only authentic users have access to the system and its resources. The authentication process identifies the validity of the user that wants to gain the access to the resources. • Non Repudiation - The sender and the destination must not deny the transmission of packets sent by them. 3. NEED OF SECURITY IN AD HOC NETWORK The Mobile ad hoc networks have two kinds of nodes based on their behaviour [3]- 1. Normal node - A node that performs the task ac- cording to the defined protocol and maintains the security of the network is considered as a normal node. 2. Malicious node - A node which violates any of the security principles is known as malicious node. Such node can affect the network adversely there- by degrading the performance of the network. Thus several algorithms have been used for identi- fication and removal of the malicious node. Mali- cious or susceptible behavior can be of several kinds like packet drop, battery drained, bandwidth consumption, linkage problem, denial of re- sources, modification of data, insertion of dupli- cate packets etc. A normal node maintains and follow all the securi- ty principles. Malicious nodes act as normal nodes in the network and violate the security parameters in active or passive manner. Malicious behaviour has several forms which are explained below [1]- 1. A malicious node captures the packet that are transferred in the network and drops it so that it never reaches the original destination. 2. A malicious node can waste the power of the bat- tery by performing unnecessary tasks like holding the network data for long, sending the duplicate data etc. 3. A node can fill the network with abnormal data so that normal data cannot be transferred. 4. A malicious node tries to hold the bandwidth of the network by continuously engaging it and denying the use of the legitimate nodes. 5. A malicious node can disturb the network without giving any authentic details. 6. The malicious node can enter duplicate fake pack- ets so as disturb the network. 7. Any malicious node can intentionally delay the packet before sending it in the network. 8. The linkage between the nodes can be broken which will affect the communication between the nodes. 9. The packet data can be modified by the malicious nodes. 10. The malicious node can forge the existing routes by creating new fake routes so as to send the packets on wrong paths. 11. An attacker node can make the node isolated while making delays in its path so that The source node selects another path to send the packets. 12. A malicious node can store al the information about the transfer of packets for future attack. 13. A malicious node can hack the session between the two genuine nodes thereby stealing the infor- mation and disturbing the communication process. 4. ATTACKS DUE TO MALICIOUS NODES The presence of malicious nodes introduces internal attacks. These internal attacks are type of active attack as they disrupt the message and the network directly. Misbehaving nodes are difficult to detect as they are also part of the network. These attacks are done at network, transport and application layer of the net- work. These attacks include [3,4]- 1. Wormhole attack: The malicious node creates a tunnel between the far nodes by creating an illu- sion that they are neighbouring nodes and thus it affects the choice of the path for data transmission which will not involve honest nodes.
  • 3. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 472 2. Byzantine attack: This attack is done by a com- promised node that create attacks by performing certain tasks like creating a loop in the routing, dropping the packets, and sending the packets on non efficient paths over the network. This category of attack is difficult to find out as all the nodes look normal in this kind of network. 3. Resource consumption attack: In this attack, the attacker waste the limited resources of the network so that genuine users cannot utilise it. 4. Manipulation of data: One simple attack is modifi- cation of the data which is done by malicious nodes. 5. Grey hole attack: An intruder broadcast the infor- mation that it is having shortest distance to the des- tination which result in rerouting of the path to send the packets. The invalid path will result in un- successful transmission of data. 6. Eclipse attack: The malicious node divide the net- work into multiple partition and monitors the data flowing between the partitions. It can also control the data flowing between the networks. 7. Session attack: The attacker can take over the con- trol of the session once the session authentication is over. The malicious node can obtain the confi- dential information and use the information for performing other attacks. 8. Jamming attack: The malicious node will jam the network so that the sender cannot send the data packets and the receiver cannot receive the pack- ets. The network is flooded by unnecessary data so as to flood the overall network. 9. Routing attack: Attacks related to routing protocol are routing attacks. These are routing table over- flow, routing table poisoning, packet replication, route cache poisoning, rushing attack. 5. DEFENSIVE TECHNIQUES IMPLEMENTED Many researchers have focused on this problem and invented some mechanisms to deal with the problem. Vidhya.K has implemented collaborative contact based watchdog technique for identification of he ma- licious node and isolation of it from the network[6]. The secure route is selected by choosing the normal nodes of the network. This mechanism is an improved version of watchdog technique. In general, the watch- dog technique observes the time of sending packets and storing packets and if the former is more than lat- ter then it gives a warning to the network that the re- spective node is malicious. This technique also does not work for large umber of nodes. The improved ver- sion works for larger number of nodes as well as it can match with the movement of the nodes within the network. The problem of false node detection is also solved by this method. Apart from all the advantages, the approach has some limitations like its working process is not that fast at the time of network conges- tion due to which packets start dropping. Nidhi Lal has given another technique to improve the watchdog technique by adding the destination se- quenced distance vector routing protocol that gives more secure route[7]. It is known as I-watchdog which is helpful in avoiding DoS attack as well as congestion over the network. The process has two phases, First phase involves authenticating the nodes that are send- ing the updated information of the routes. In second phase, the nodes will analyse the working and events of the other working nodes. If the events were differ- ent from the prescribe events, then that node is de- clared as malicious. The main drawback of this mech- anism is that it generates false alarm for malicious nodes and don’t support any other routing protocol other than distance vector routing protocol. Sruthi R and Vijayakumar have given a trust based mechanism for detection and removal of malicious nodes[8]. This method depends on the calculated val- ue of trust and the reputation value of the nodes and identify the malicious nodes. There are three modules, monitor module, trust module and reputation module. Monitor module collects the information regarding the neighbouring nodes, trust module rate the behaviour of the nodes and reputation module analyse the trust value and reputation value of the nodes and determine the misbehaving nodes. The report of the malicious nodes are sent to the network so as to remove those nodes from the network. The normal reputation value and trust value has been predefined by the system. If any neighbouring node trust value or reputation value comes below the predefined value, then alert is sent for the corresponding node. This approach considers all the aspects of the node but it consume a large amount of time. Chinthanai Chelvan,K. had proposed EAACK, an intrusion detection system to improve the security of the network by using the watchdog improved version to detect and eliminate the abnormal nodes whenever such report is received[9]. This approach has two modules Secure acknowledgement and misbehaviour report authentication(MRA). Both modules perform their specific responsibility.
  • 4. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 473 The secure acknowledgement (s-ack) approach solves the problem of failing to detect the malicious nodes in case of receiver collision. The network makes the group of three nodes, where third node is responsible for sending the s-ack to the first node, this process ensures the safe network without collision. If the first node dint receive the s-ack until the specified limit of time, then it declare the receiver collision.The MRA part solves the watchdog problem where malicious nodes are not detected due to false acknowledgement report. In this case, the malicious node itself sends the acknowledgement report. The report is checked by the algorithm to verify that the packets sent were received by the genuine destinations. By verifying it, the validi- ty of the acknowledgement report can be determined. Mamatha S. and A.Damodaran provided the method for detecting and isolating malicious node by using an anomaly based IDS that monitors the node behavior to avoid the occurrence of the attacks[10]. Data trans- mission quality function is used for identification of normal nodes with malicious nodes. IDS agent is the major module that checks on each node of the net- work. This agent has four separate modules. The first module data collection module collects the infor- mation of each node and computes the quality of data transfer for them in the network. The intrusion detec- tion module takes the information of data collection module and verify it with the standard values, if it does not matches, then the corresponding node is termed as malicious. The voting module will verify whether the malicious node is really malicious or it is falsely detected. This module take the votes of the other nodes which can confirm the misbehaviour. Af- ter the node is confirmed as malicious, the last module segregation removes the node from the network. This mechanism has an advantage of no communica- tion overhead. The drawback is that this approach can only be performed with Adhoc on demand distance vector algorithm due to which it can prevent very few attacks. Vijayakumar 2015 had given a Reputed packet deliv- ery approach that involved audit misbehaviour detec- tion and monitoring method[11]. The main task of this method was to detect and remove the malicious node from the mobile ad hoc networks. The node behaviour is monitored for each packet transferred over the net- work. Misbehaviour node’s detection and prevention is done within the following three major parts audit monitoring, reputation and route discovery. The sys- tem evaluates the reputation among nodes in the net- work. Each node has its own view over the other node in the network. The first and second hand information are used to evaluate the reputation of each node and then according to the result from the evaluation the node is determined to be the misbehaviour node or a legitimate node. Once misbehaviour node is identified, then enhance the additive increase/multiplicative de- crease principle is used to isolate them from active path. Anitha G. and Hemlatha. M. have used the approach of sending the ID of the malicious nodes to all the existing nodes over the network[12]. This approach helped in intrusion prevention and message authenti- cation in the network. ThirumalaSelvi.V. and ThomsonFredrik,E.J., have provided an on-demand distributed protocol for de- termining malicious node in ad hoc network[13]. They have also used AODV routing protocol for secu- rity of nodes in the network. Apart from these, several other intelligent defence mechanisms have also been implemented. 6. DEFENSIVE TECHNIQUES IMPLEMENTED Mobile Ad-hoc wireless networks has been dealing with several security problems from last few years. One of the major area of research is in identification and removal of malicious nodes. Various techniques have been developed till now which are working on different concepts. Every technique has its own bene- fits and limitations. This paper has covered various defence techniques for determining the malicious nodes and removing them. There is still lot of scope of research in this area REFERENCES [1] Saini Radhika; Khari Manju.(2011): Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network, International jour- nal of computer application, Vol 20, issue 4, pp 18-21. [2] Jangra1; A. Goel; N. Priyanka; Bhati,K. (2010): Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture, International Journal of Electronics Engineering, pp 189- 196. [3] Abhay kumar Rai; Rajiv Ranjan Tewari; Saurabh Kant Upadhyay (2010): Different types of attacks on integrated MANET- internet communication, International Journal of computer science and se- curity, vol 4, issue 3, pp 265-275. [4] Vidhya.S.V.; Deepa A.J( 2014): A survey on se- curing MANETS from malicious behaviour by detection mechanism, International journal of
  • 5. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 474 computer science and information technologies, Vol 5, issue 10, pp 969-977. [5] Sibomana Fabrice; Dr. E.J.Thomson Fredrik (2017):Detection And Prevention of Malicious Node Based on Node Behaviour in MANET, In- ternational Journal of Advanced Research in Computer Science, Vol. 8, No. 9, pp 774-777. [6] Vidhya. K.; Sundhar. U; Anantharaj. B (2016) :Detection of Node Activity and Selfish & Mali- cious Behavioural Patterns Using Watch Dog- Chord Algorithm, International journal of emerg- ing technology in computer science and electron- ics, Vol 23, issue 1, pp 22-30. [7] Nidhi Lal; Kumar Shishupal; Saxena Aditya; Chaurasiya Km. Vijay (2015): Detection of Mali- cious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme, International conference on Advances in Computing, Communication and Control, Vol 49, pp 264-273. [8] Sruthi R.;Vijayakumar R. (2014): Prevention of MANETS from Malicious Node Attacks, Interna- tional Journal of Computer Applications, Vol 112, issue 14, pp 23-25. [9] Chinthanaichelvan K.; Sangeetha T.; Prabakaran V.; Saravanan D. (2014): EAACK-A Secure In- trusion Detection System for MANET”, Interna- tional journal of Innovative Research in Computer and Communication Engineering, Vol 2, issue 4, pp 3860-3866. [10]Mamatha S.; Damodaram A. (2014): Intrusion Detection System for Mobile Ad hoc Networks Based on the Behaviour of Nodes, International Journal of Grid Distribution Computing, Vol 7, issue 6, pp 241-256. [11]Vijayakumar. A; Selvamani K; Pradeep Kumar Arya (2015): Reputed Packet Delivery Using Ef- ficient Audit Misbehaviour Detection and Moni- toring Method in Mobile Ad hoc Networks, Inter- national Conference on intelligent Computer, Communication and Convergence, Vol 48, pp 489-496. [12]Anitha G; Hemalatha (2014): Intrusion Preven- tion and Message Authentication protocol(IMAP) Using Region Based Certificate Revocation List Method in Vanet ,International journal of Engi- neering and Technology, Vol 6, issue 2, pp 663- 672. [13]Thirumalai V. Selvi; Thomson Fredrick E.J (2016) : Secure on Demand Distributed Protocol for Spontaneous Wireless ad hoc network, Inter- national Journal of Computer Science and Infor- mation Technology & Security, Vol 6, issue 6, pp 21-24.