Security Enhancement in MANETS using the Concept of Leader Nodes

نویسندگان

  • Jatinder Singh
  • D. B. Johnson
  • D. A. Maltz
  • S. K. Dhurandher
چکیده

This paper is aimed to detect the malicious behavior of the nodes by first selecting some set of leader nodes. The leader nodes are those set of nodes in a network which monitor the whole network of nodes. The set of leader nodes is referred as the dominating set. A set is dominating if all the nodes of the network are either in the set or neighbors of nodes in the set. The efficiency of a commanding-set-based broadcasting or routing is mainly dependent on the overhead in constructing the dominating set and the size of the dominating set. The leader nodes are working in the promiscuous mode and they overhear traffic in its neighborhood. In promiscuous mode the system (NS-2) by-pass the MAC(Media Access Control) filtering procedure and the nodes working in promiscuous mode, receives the packets that are sent or received by any other node in its transmission range even if the packets were not intended for that node, this phenomenon is commonly known as packet overhearing. The leader nodes also monitor the topology of the network and reports if there are any changes in the network on the basis of a certain criteria, moreover they also detect if any packet is modified, and the snooping attack and calculate the forward packet ratio.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Enhanced Onion Routing Framework for MANETs

The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) environment such wireless node communication issues are node traffic, node attack and data accessing of intermedia...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014