Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective Security Approach for MANET using Detection Algorithm

R. Sathya, Dr.P. Latha


Mobile Ad-hoc Network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. MANET does not require any fixed infrastructure and it is capable of self configuring, these unique characteristics made MANET ideal to be deployed in a remote or mission critical area like military use or remote exploration. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. This paper proposes a TAODV for improving security in adhoc routing protocol. The proposed TAODV detects the network layer attacks like blackhole and wormhole attack and rectifies it by using the trust values. This proposed scheme is based on incentives and penalties depending on the behavior of the nodes in the network. The TAODV allow the source node to choose the trusted and the shortest path during the route discovery and isolate malicious node in the network.


Black Hole Attack, MANET, Security, Trust, Wormhole Attack.

Full Text:



R.Sathya, Dr.P.Latha,” Provision of Security Using Detection Algorithm in MANET”, International Conference on Computing and Control Engineering, Dr.M.G.R University, Chennai, 2012.

C. Perkins, E. Royer and S. Das, “Ad hoc on-demand distance vector routing”, RFC-3651, (Jul. 2003).

M. G. Zapata and N. Asokan, “Securing Ad hoc Routing Protocol”. In the proceeding of 3rd ACM workshop on Wireless Security 2002, 1-10.

S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Network”. In the Proceedings of 6th annual conference on Mobile Computing and Networking 2000, 255-265.

X. Li, M. R. Lyu, J. Liu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks”. In the Proceedings of IEEE Aerospace Conference (IEEEAC) 2004, 1286-1295

C. Perkins, “Ad Hoc Networks”, Addison-Wesley, 2001.

M. Zapata, “Secure Ad Hoc on-Demand Distance Vector (SAODV)”. Internet draft, draft-guerrero-manet-saodv-01.txt, 2002.

Y. Hu, A. Perrig, and D. Johnson, Ariadne: “A Secure On-Demand Routing for Ad Hoc Networks”. Proc. of MobiCom 2002, Atlanta, 2002.

B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.

Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: “A Defense against Wormhole Attacks inWireless Ad Hoc Networks.” Proc. of IEEE INFORCOM, 2002.

Leashes, G. Vigna, S. Gwalani, E. Belding-Royer, and R. Kemmerer, “A Defense against Wormhole Attacks in Wireless Networks,” in Proc. 20th ACSAC, Dec. 2004, pp. 16–27

Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Attacks in Mobile Ad hoc Networks”. International Journal of Computer Science and Security,2(3):18-29, 2008

Bingwen He, Joakim Hägglund and Qing GU. “Security in Adhoc Networks”, an essay produced for the course Secure Computer Systems HT2005 (1DT658), 2005 IEEE Std. 802.11. “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)Specifications”, 1997

Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung. “WAP: Wormhole Attack Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008

Moumita Deb, “A Cooperative Black hole Node Detection Mechanism for ADHOC Networks”, Proceedings of the World Congress on Engineering and Computer Science, 2008

Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal and Ajith Abraham. “A Distributed Security Scheme for Ad Hoc Networks”, ACM Publications, Vol-11, Issue1, pp.5–5, 2004

Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”. Journal of Internet Engineering, 2:1, 2008

Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah. “A Survey on MANET Intrusion Detection” International Journal of Computer Science and Security, 2(1):1-11, 1999

Frank Kargl, Andreas Klenk, Stefan Schlott and Michael Weber. “Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks”, In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, 2002

Murali Kodialam, T. V. Lakshman. “Detecting Network Intrusions via Sampling: A Game Theoretic Approach”, In Proceedings of IEEE INFOCOM, 2003

Patcha, A; Mishra, A. “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, In Proceedings of Radio and Wireless conference, RAWCON apos; 03,Vol. 10, Issue 13, pp. 75–78, Aug 2003

N. Song, L. Qian and X. Li. “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach”, In proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, 2005

Nasser, N, Yunfeng Chen. “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks”, In proceedings of IEEE International Conference on Communications, ICC apos; Vol-07 , Issue 24-28, pp.1154 – 1159, June 2007

S.Dhanalakshmi, Dr.M.Rajaram. “A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”, IJCSNS International Journal of Computer Science and Network Security, 8(10), October 2008

Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang and Mei-Chun Chou. “Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks”, In Proceedings of 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008, AINAW

March 2008 Yi, Ping Wu, Yue Li and Jianhua. “Malicious node detection in Ad Hoc networks using timed automata”, In Proceedings of IET Conference on Wireless, Mobile and Sensor Network (CCWMSN07), Shangai, China, 2007

Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika. "Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks", In Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447-450, 2009

Dan Pei, Lixia Zhang, Dan Massey, “A Framework for Resilient InternetRouting Protocols”, IEEE Network special issue on Protection, Restoration, and Disaster Recovery, April 2004

Sreekanth Malladi, Jim Alves-Foss, Robert B. Heckendorn, “OnPreventing Replay Attacks on Security Protocols”, Paper presented at the International Conference on Security and Management, 2002.

Johnson, D., “Routing in Ad Hoc Networks of Mobile Hosts,”Proc. of the Workshop on Mobile Computing Systems and Applications, Dec. 1994, pp. 158-163


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.