AODV-UI with Malicious Node Detection and Removal for Public MANET

نویسندگان

  • Ruki Harwahyu
  • Boma Anantasatya Adhi
  • Harris Simaremare
  • Abdusy Syarif
  • Abdelhafid Abouaissa
  • Riri Fitri Sari
  • Pascal Lorenz
چکیده

A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, this nature of MANET makes it very vulnerable to various attacks, especially by nodes within the MANET that is called malicious nodes. This paper provides a preliminary result for MANET security enhancement based on AODV-UI routing protocol. In this work we implement an algorithm to detect and remove malicious nodes in AODV-UI routing protocol. We evaluate our work in different scenarios by varying the number of nodes, the number of malicious node, the sending rate of the node in concern, and the type of the attack i.e. route poisoning, black hole, packet spoofing. Our experiment shows that on average, an attack can be completely removed within 0.48 seconds in the worst case, with the traffic rate of 100 kbps, and 0.04 seconds in the best case, with the sending rate of 10 kbps.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique

Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Dista...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Black Hole Detection in MANET Using AODV Routing Protocol

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

متن کامل

Survey on Black Hole Detection and Prevention in MANET

Mobile ad hoc network (MANET) is a self-implemented network of mobile nodes formed anytime and anywhere without the help of a centralized management. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared to wired network or infrastructure-based wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013