Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

ABSTRACT Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior integrity, confidentiality etc [4]. An intruder takes advantage of of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc. General Terms Security, Algorithms Keywords Ad Hoc Network, Nodes, Security, Attack, Malicious Behavior 1. INTRODUCTION Ad Hoc Network provides quick communication among nodes (like mobile or a laptop) to transfer the packets from one node to other. An example of an ad hoc network is given in figure 1 where nodes are communicating directly with each other. All the links between nodes are wireless. Bluetooth [1] is a typical example of such networks. These networks are independent of any fixed infrastructure or central entity like cellular networks [2] which requires fixed infrastructure to operate. operations.

[1]  Seung-Jun Yu,et al.  Wireless Communication , 1916, Nature.

[2]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[3]  Zeyad M. Alfawaer,et al.  A Proposed Security Subsystem for Ad Hoc Wireless Networks , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[4]  Sunita Sahu,et al.  A COMPREHENSIVE SURVEY ON INTRUSION DETECTION IN MANET , 2010 .

[5]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[6]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[7]  Upena Dalal,et al.  Wireless Communication , 2010 .

[8]  William Stallings,et al.  Cryptography and network security , 1998 .

[9]  Christos Xenakis,et al.  A novel Intrusion Detection System for MANETs , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[10]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  Priyanka,et al.  Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture , 2010 .

[13]  Dong Seong Kim,et al.  INTRUSION DETECTION SYSTEM , 2013 .