Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks

Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc networks. KeywordsAd Hoc Networks; Nodes; Security; Attack; Malicious Behavior

[1]  Priyanka,et al.  Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture , 2010 .

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Seung-Jun Yu,et al.  Wireless Communication , 1916, Nature.

[4]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[5]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.