Circuits and Systems

Volume 7, Issue 6 (May 2016)

ISSN Print: 2153-1285   ISSN Online: 2153-1293

Google-based Impact Factor: 0.48  Citations  

Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET

HTML  Download Download as PDF (Size: 929KB)  PP. 748-758  
DOI: 10.4236/cs.2016.76064    2,486 Downloads   4,134 Views  Citations

ABSTRACT

Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security is the primary issue in MANET which degrades the network performance significantly. In this paper, cluster based malicious node detection methodology is proposed to detect and remove the malicious nodes. Each node within the cluster gets the cluster key from the cluster head and this key is used for the data transaction between cluster head and node. The cluster head checks this key for every data transaction from node and match with their cluster table. If match is valid, and then only it will recognize that this node is belongs to this cluster, otherwise it is decided as malicious node. This paper also discusses the detection of link failure due to the presence of malicious node by determining the gain of each link in the network. The performance of the proposed method is analyzed using packet delivery ratio, network life time, and throughput and energy consumption. The proposed malicious node detection system is compared with the conventional techniques as OEERP (Optimized energy efficient routing protocol), LEACH (Low energy adaptive clustering hierarchy), DRINA (Data routing for In-network aggregation) and BCDCP (Base station controlled dynamic clustering protocol).

Share and Cite:

Gopalakrishnan, S. and Kumar, P. (2016) Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET. Circuits and Systems, 7, 748-758. doi: 10.4236/cs.2016.76064.

Cited by

[1] An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs)
International Journal of …, 2022
[2] Energy Efficient Cluster based Multipath Routing Protocol in MANET using Genetic Particle Swarm Optimization Algorithm
International Journal of Intelligent Systems and …, 2022
[3] A Novel Approach for Energy Efficient Cluster-based In-Network Data Fusion (CBDF) in Wireless Sensor Networks (WSN)
International Journal of …, 2022
[4] Optimizing QoS-Based Clustering Using a Multi-Hop with Single Cluster Communication for Efficient Packet Routing
… Journal of Electrical …, 2022
[5] Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier
Journal of Applied …, 2021
[6] Analysis and Performance of Various Routing Algorithm in Mobile Ad-Hoc Network (MANET)
2021
[7] A Review of the cluster based Mobile Adhoc Network Intrusion Detection System
2021
[8] Performance Analysis of Residual Node Detection and Mitigation Using Feature Set and Classification Approach
2019
[9] Two Variants of Secure Routing Algorithms in Mobile Ad Hoc Network
2019
[10] Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks
2019
[11] India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach
2019
[12] Cluster based Intrusion Detection System for Mobile Ad-hoc Network
2019
[13] Multivariate analysis for fuzzy correlated node behavior detection in wireless sensor network
2018
[14] Performance analysis of malicious node detection in MANET using ANFIS classification approach
Cluster Computing, 2018
[15] An Efficient Node Localization and Failure Node Detection in Manet Environment

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.