Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET
Creators
- 1. Assistant Professor, Department of Computer Science, Government Arts College, Trichy.
- 2. Associate Professor, Department of Computer Science and Engineering, Sengipatti, Thanjavur.
Contributors
- 1. Publisher
Description
Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are energy depletion, link disconnection, mobility and coverage. Hence the selection of monitoring nodes plays an important role in IDS. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks. In this technique, the whole network is virtually divided in smaller grid like zones. In each grid, the nodes with higher stability and better coverage are assigned a reward value. A cost metric is derived in terms of energy consumption and computational delay. Then the nodes with minimum cost and high reward are selected as monitoring nodes. By simulation results, it is shown that the proposed technique has reduced detection delay, energy consumption and detection overhead.
Files
D6704049420.pdf
Files
(765.1 kB)
Name | Size | Download all |
---|---|---|
md5:64995b7917dcd3a4c36eb963dba863f0
|
765.1 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
Subjects
- ISSN
- 2249-8958
- Retrieval Number
- D6704049420/2020©BEIESP