Identification of Malicious and Liar Nodes by Query Processing In Manets

Authors(2) :-R. Gangadevi, T. Ravichandran

Mobile Ad-hoc Networks (MANETs) is a collection of mobile nodes sharing a wireless channel without any centralized control (or) established communication backbone. MANETs require fundamental changes to network routing protocols. These are characterized by the mobility of nodes, which can move in any direction and at any speed that may lead to arbitrary topology and frequent partition in the network. In the existing method, the malicious nodes are identified based on the grouping. In MANETs, if a normal node becomes an attacker, the malicious node tries to disrupt the operations of the system. The main drawback in the above existing method that it doesn’t address the critical Liar Nodes (LNs) responsible for the network in security. In this proposed work, malicious node are identified based on the top-k-query processing methods and it is also designed to locate and identify LNs by the False Notification Attacks (FNA) using the Dynamic Source Routing (DSR) reactive routing protocol and to prevent the liar nodes from performing False Notification Attack (FNA). So that the message can be sent with more security by using the Rivest Shamir Adleman (RSA) Algorithm and Secure Hashing Algorithm 1(SHA1) methods and also with less power, thereby increasing the battery life. To analyse the following parameters such as Throughput and packet loss were simulated through Network Simulator-2 (NS-2). In the proposed work, the output produced promising results to identify and eliminate the LNs, and thus reducing the number of unwanted nodes thereby improving security due to unwanted nodes using majority of the network performance and metrices.

Authors and Affiliations

R. Gangadevi
PG Scholar, Department of ECE, Annamalai University, Tamil Nadu, India
T. Ravichandran
Associate Professor, Department of ECE, Annamalai University, Tamil Nadu, India

Ad-Hoc Networks, Attacker, Liar Nodes, Malicious Nodes, Query Processing

  1. W.T. Balke, W. Nejdl, W. Siberski, and U. Thaden, ‘‘Progressive distributed top-k retrieval in peer-to-peer networks,’’ in Proc. ICDE, Apr. 2005, pp. 174–185.
  2. Kejun. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, ‘‘An acknowledgment-based approach for the detection of routing misbehavior in MANETs,’’ IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
  3. Minji. Wu, J. Xu, X. Tang, and W. C. Lee, ‘‘Top-k monitoring in wireless sensor networks,’’ IEEE Trans. Knowl. Data Eng., vol. 19, no. 7, pp. 962–976, Jul. 2007.
  4. R. Zhang, J. Shi, Y. Liu, and Y. Zhang, ‘‘Veri?able ?ne-grained top-k queries in tiered sensor networks,’’ in Proc. INFOCOM, Mar. 2010, pp. 1–9.
  5. P. Dewanand, P. Dasgupta, ‘‘P2P reputation management using distributed identities and decentralized recommendation chains, ’’IEEE Trans Knowl. Data Eng., vol. 22, no. 7, pp. 1000–1013, Jul. 2010.
  6. J. Shi, R. Zhang, and Y. Zhang, ‘‘A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks,’’ in Proc. INFOCOM, Jan.2011, pp. 945–953.
  7. C.M.Yu, Y.T.Tsou, C.S.Lu and S.Y.Kuo, “Practical and secure multi dimensional query frame work in tiered sensor networks,” IEEE Trans. Inf. Forensics Security, vol.6, no.2, pp.241-245, Jun 2011.
  8. Y. Sasaki, T. Hara, and S. Nishio, ‘‘Two-phase top-k query processing in mobile ad hoc networks,’’ in Proc. NBiS, Sep. 2011, pp. 42–49.
  9. B.Malhotra, M.A. Nascimento, and I. Nikolaidis, ‘‘Exact top-k queries in wireless sensor networks,’’ IEEE Trans .Knowl. Data Eng., vol.23, no.10, pp. 1513–1525, Oct. 2011.
  10. Rui Zhang, Jing Shi, Yanchao Zhang and Jinyuan Sun, “Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks” , in IEEE Journal on selected areas in communications, Vol. 30, No. 2, February 2012.
  11. Y. Yi, R. Li, F. Chen, A. X. Liu, and Y. Lin, ‘‘A digital watermarking approach to secure and precise range query processing in sensor networks,’’ in Proc. INFOCOM, Apr. 2013, pp. 1950–1958.
  12. D. Amagata, Y. Sasaki, T. Hara, and S. Nishio, ‘‘A robust routing method for top-k queries in mobile ad hoc networks,’’ in Proc. MDM, Jun. 2013, pp. 251–256.
  13. C.M. Yu, G.K. Ni, I.Y. Chen, E. Gelenbe, and S.Y. Kuo, ‘‘Top-k query result completeness veri?cation in tiered sensor networks,’’ IEEE Trans. Inf. Forensics Security, vol. 9, no. 1, pp. 109–124, Jan. 2014.
  14. T. Tsuda, Y. Komai, Y. Sasaki, T. Hara, and S. Nishio, ‘‘Top-k query processing and malicious node identi?cation against data replacement attack in MANETs,’’ in Proc. MDM, Jul. 2014, pp. 279–288.
  15. J. Shi, R. Zhang, and Y. Zhang, ‘‘Secure top –k –query processing in unattended tiered sensor networks,’’ in Proc. INFOCOM, Nov 2014, pp. 945–953.
  16. Y. Zhang, G. Wang, Q. Hu, Z. Li, and J. Tian, ‘‘Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks,’’ in Proc. INFOCOM, Mar. 2012, pp. 10–18.
  17. S. Chen, Y. Zhang, Q. Liu, and J. Feng, ‘‘Dealing with dishonest recommendation: The trials in reputation management court,’’ Ad Hoc Network., vol. 10, no. 8, pp. 1603–1618, Nov. 2012.
  18. Z. Li and H. Shen, ‘‘A hierarchical account-aided reputation management system for large-scale MANETs,’’ in Proc. INFOCOM, Apr. 2011, pp. 909–917.
  19. X. Liu, J. Xu, and W. C. Lee, ‘‘A cross pruning framework for top-k data collection in wireless sensor networks,’’ in Proc. MDM, May 2010, pp. 157–166.
  20. M. Yiu, Y. Lin, and K. Mouratidis, “Ef?cient veri?cation of shortest path search via authenticated hints,” in Proc. IEEE ICDE, Long Beach, CA, USA, Mar. 2010, pp. 237–248.
  21. D. Ma, C. Soriente, and G. Tsudik, “New adversary and new threats: Security in unattended sensor networks,” IEEE Netw., vol. 23, no. 2, pp. 43–48, Mar. 2009.
  22. M. Ye, X. Liu, W.-C. Lee, and D. L. Lee, “Probabilistic top-k query processing in distributed sensor networks,” in Proc. IEEE ICDE, Long Beach, CA, USA, Mar. 2010, pp. 585–588.
  23. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 954–962.
  24. R. Lu, X. Lin, H. Zhu, and X. Shen, “TESP2: Timed ef?cient source privacy preservation scheme for wireless sensor networks,” in Proc. IEEE ICC, May 2010, pp. 1–6.

Publication Details

Published in : Volume 5 | Issue 3 | March-April 2018
Date of Publication : 2018-04-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 266-274
Manuscript Number : IJSRSET185341
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

R. Gangadevi, T. Ravichandran, " Identification of Malicious and Liar Nodes by Query Processing In Manets, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 5, Issue 3, pp.266-274, March-April-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET185341

Article Preview