Loading

An Experimental Analysis on Various Techniques for Malicious node Detection in MANET
Chetan S Arage1, K. V. V. Satyanarayana2

1Chetan S Arage, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Andhra Pradesh, India. 

2K. V. V. Satyanarayana, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Andhra Pradesh, India.

Manuscript received on 02 July 2019 | Revised Manuscript received on 16 July 2019 | Manuscript Published on 23 August 2019 | PP: 182-191 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I30360789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3036.0789S319

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile ad hoc networks (MANETs) are a subclassT of wireless ad hoc networks having exceptional characteristics of dynamic system topology and moving nodes. MANETs are infrastructure-less, self arranging networks intendedT to support mobility. Because of these attributes, there is need of separate routing protocols for MANET. The advantages such as non-limited versatility, simple organization attributes of MANETs make them exceptionally important and veryT reasonable mainly for crisis situations and military applications. Within the sight of malevolent nodes, this prerequisite may lead to genuine security threats; for example, such nodes may disturb the routing process. In this specific circumstance, avoiding or identifying malicious nodes launching gray hole or collaborative blackhole attacks is a challenge. This paper is focuses on surveying and a reviewing of MANETT security attacks and approaches to defend from vulnerabilities. The routing protocol mainly concerned in this approach is Dynamic Source Routing Protocol (DSR). The schemes like Watchdog, TWOACK, AACK, EAACK and CBDST have been used for detection of malicious nodes in MANET. Our research aim is to identify current trends, open challenges and future research directions in the deployment of MANET by considering the malicious node detection scheme.T In order to bridge the research gap in terms of performance, detection rate and overhead; also to overcome the challengesT of existing security issues regarding MANET. The aim is to propose an improved cooperative bait detection scheme (ICBDS) to detect malicious nodeT maintaining minimal overhead.

Keywords: Watchdog, Mobile Adhoc NETwork (MANET), Security, Enhanced Adaptive ACKnowledgement (AACK,EAACK).
Scope of the Article: Mobile Adhoc Network