Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks
Author(s) -
G. Indirani,
K. Selvakumar
Publication year - 2012
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/7915-9258
Subject(s) - computer science , computer network , mobile ad hoc network , node (physics) , network packet , flooding (psychology) , wireless ad hoc network , computer security , wireless , telecommunications , psychology , structural engineering , engineering , psychotherapist
mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MANET). In this technique, the nodes with highest trust value, residual bandwidth and residual energy are selected as active nodes using swarm intelligence based ant colony optimization. Each active node monitors its neighbour nodes and estimates the trust value. If the active node finds any node below a minimum trust threshold, then the node is marked as malicious and an alert message is sent to the source node. When the source node wants to forward the data packet to destination, it discards the malicious nodes in that path and bypasses the data through other nodes in alternate path. It also performs the certificate revocation process for the malicious nodes. By simulation results, we show that the proposed approach reduces overhead. Keywordsad hoc Networks (MANET), Attacks, Swarm Based
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom