Application Based Detection Technique for Secure Mobile Ad-hoc Network
Kamini Maheshwar1, Sapna Bagde2, Deshraj Ahirwar3 

1Kamini Maheshwar, Computer Science & Engineering, BUIT Barkatullah University, Bhopal, (MP), India.
2Sapna Bagde, Information Technology, BUIT Barkatullah University, Bhopal, (MP), India.
3Deshraj Ahirwar, Computer Science & Engineering, Samrat Ashok Technological Institute, Vidisha, (MP), India.
Manuscript received on December 05, 2011. | Revised Manuscript received on December 17, 2011. | Manuscript published on January 05, 2012. | PP: 205-211 | Volume-1 Issue-6, January 2012. | Retrieval Number: F0301111611/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An ad-hoc network is often defined as an infrastructure less network, meaning a network without the usual routing infrastructure like fixed routers and routing backbones. Typically, the ad-hoc nodes are mobile and the underlying communication medium is wireless. In mobile ad-hoc networks, the data tends to be intercepted by malicious node when using a single path for transmission. Also, the wireless channel in a mobile ad-hoc network is accessible to both legitimate network users and malicious attackers. So, the task of finding good solutions for these challenges plays a critical role in achieving the eventual success of mobile ad-hoc networks. In this paper, we proposed an efficient monitoring technique that uses readily available information from different layers of the protocol stack to detect “malicious packet-dropping”, where a faulty node silently drops packets destined for some other node. A key source of information for this technique is the messages used by the special ad-hoc routing protocols. This technique can be deployed on any single node in the network without relying on the cooperation of other nodes, easing its deployment. Our simulation results show that proposed technique has good detection effectiveness across a wide variety of network mobility models.
Keywords: MANET, Secure Routing Protocol, Monitoring Detection Technique.