2011
DOI: 10.5120/2422-3251
|View full text |Cite
|
Sign up to set email alerts
|

Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

Abstract: Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Security and reliability are two major challenges for successful communication in wireless networks. A reliable network must be able to cope with the malicious behaviour [5] of these components. The authors in [6], developed a computer system by introducing the communication between loyal and disloyal generals through a messenger.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Security and reliability are two major challenges for successful communication in wireless networks. A reliable network must be able to cope with the malicious behaviour [5] of these components. The authors in [6], developed a computer system by introducing the communication between loyal and disloyal generals through a messenger.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…ASRP is used to provide powerful security extensions to reactive AODV protocol based on modified secure remote password protocol and Deffie-Hellman (DH) algorithm. Radhika Saini et al [7] have presented the malicious behavior of the node and security solution to defend such behavior. Security solutions include cryptography, protocols, Intrusion Detection System (IDS) and Trusted Third Party (TTP).…”
Section: Literature Surveymentioning
confidence: 99%
“…The types of some malicious behavioursof a node are packet drop, battery drained, delay of packet, stale packets, link break, message tampering, bandwidth consumption, stealing information, buffer overflow, malicious node entering, denying from sending message, node not available, session capturing and others [2] …”
Section: B Normal Node Vs Misbehaviour Nodementioning
confidence: 99%
“… Normal node The security purpose in any network is to maintain the security principles of the network which are confidentiality, availability, integrity, authenticity and non-repudiation [2], if any node in the network manages to maintain all these principles then that node is considered as a normal node.…”
Section: B Normal Node Vs Misbehaviour Nodementioning
confidence: 99%