Identifying malicious nodes in Mobile Ad-Hoc Networks using polynomial reduction algorithm

A Mobile Ad-Hoc Network (MANET) is a dynamic ad hoc network without any fixed infrastructure. Since it is dynamic in nature, it can configure and vary locations by itself, on the move. Since devices in a MANET are autonomous and can move in any direction, they change links with other devices very often. One of the principal challenges in building a MANET is to properly route traffic in order to constantly maintain the information needed by equipping each device. Those kinds of networks can be self-operated or may be linked to the larger internet. They may have one or more - and different - transceivers between nodes, resulting in highly dynamic and autonomous topology. The primary focus is on attacks on MANET, followed by malicious node-detection through a polynomial reduction algorithm. Though scientists have evaluated algorithms for detecting and rectifying malicious nodes, the issue still lingers. As a result of record growth in technology, unknown vulnerabilities are also surfacing. Therefore, to prevent attacks on MANET, it is imperative to propose novel ideas. In this paper, an ns-2 simulator is used to ambush malicious nodes in MANET.

[1]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[2]  Dijiang Huang,et al.  Least Squares Disclosure Attack in Mobile Ad Hoc Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Vallipuram Muthukkumarasamy,et al.  Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[4]  Maha Abdelhaq,et al.  Detecting Sleep Deprivation Attack over MANET Using a Danger Theory -Based Algorithm , 2011 .

[5]  R. Sabitha,et al.  Defending against packet dropping attack using DRI & cross checking mechanism in MANET , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[6]  Saadiah Yahya,et al.  Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[7]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[8]  Chonggang Wang,et al.  Colluding injected attack in mobile ad-hoc networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[9]  N. Gandhewar,et al.  Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[10]  Nei Kato,et al.  NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.

[11]  Julien Bourgeois,et al.  Trust-Enabled Link Spoofing Detection in MANET , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[12]  Zhao Min,et al.  Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.