Analysis of Various Malicious Node Detection Techniques: A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 105 | Monthly Hits: ⮙9

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Mobile Ad-hoc Network (MANET) is self configured network and collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in decentralized manner. Security is major concern in MANET due to its various features such as open medium, limited power supply and lack of clear lines of defense. It is vulnerable to various types of DoS attacks like black hole, grey hole, worm hole, impersonation etc. In black hole attack, attacker claims to have shortest route to destination by injecting a fake reply message. This document introduces a comparative study of various malicious or DoS nodes detection schemes and analyse their performance based on various parameters viz node mobility, Quality of service, false alarm detection etc.

Keywords: Mobile Ad-hoc Networks MANET, Ad-hoc On Demand Distance Vector AODV, Dynamic Source Routing DSR, Denial of Service DoS, Black hole attack, malicious node

Edition: Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Share this Article

How to Cite this Article?

Priyanka, Mukesh Dalal, "Analysis of Various Malicious Node Detection Techniques: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201412611, Volume 3 Issue 7, July 2014, 1572 - 1577

Enter Your Registered Email Address





Similar Articles with Keyword 'Mobile Ad-hoc Networks MANET'

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 207 - 211

RADNET Routing Enhancement by Red Algorithm

Sakshi Sharma, Manjot Kaur Sidhu

Share this Article

Similar Articles with Keyword 'Ad-hoc On Demand Distance Vector AODV'

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 126 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Similar Articles with Keyword 'Dynamic Source Routing DSR'

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1154 - 1158

Route Optimization using Membrane Computing in Opportunistic Network

Ritu, Manjot Kaur Sidhu

Share this Article

Similar Articles with Keyword 'Black hole attack'

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Similar Articles with Keyword 'malicious node'

Downloads: 100 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2269 - 2272

Detecting Malicious Nodes for Secure Route Discovery in MANETs

Zalte S. S., Dr. Ghorpade V. R.

Share this Article

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 106 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 969 - 973

AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN

Varpreet Kaur, Pratibha

Share this Article



Top