Open Access Open Access  Restricted Access Subscription or Fee Access

Detection of Malicious Nodes in MANETs using Analytical Model

G. Srinidhi, K. Sentamilselvan


Mobile Ad hoc Networks (MANETs) is a kind of network composed of mobile devices distributed in a geographic area where there is a lack of fixed infrastructure or centralized administration. Nodes within communication range communicate directly, while those out of range make use of other nodes to forward the message to given destination. In MANETs packet dropping attacks have remarkable consequences among other threats. Malicious nodes drop received data or control messages instead of relaying them, thus by affecting the traffic in the network. Blackhole attacks imply malicious nodes dropping all the packets they receive. Grayhole attacks are similar but malicious nodes drop packets statistically by following a predetermined probability distribution. It should be emphasized that recognizing the actual cause(mobility, collision, errors, malicious behavior)for packet dropping in MANETs is still an open challenge, which is necessarily be addressed in order to reduce the number of false positives in IDS schemes. An Analytical model is introduced in order to distinguish between the legitimate packet dropping and malicious packet dropping behaviors. For that an enhanced windowing method is used for collecting the features from the network. From the features, the probabilities are to be calculated that are involved in analytical model. Based on the dropping probability that is estimated, concluded that the analyzed packet dropping node is malicious or legitimate by comparing with the predefined detection threshold.


Malicious Node, Packet Dropping Attack, Event Based Windowing Method, MANETs

Full Text:



. Baadache A, Belmehdi A,(2012) ‘Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks’, Journal of networks; pp.1130-1139.

. Basile C, Kalbarczyk Z T, Iyer R K,(2007) ‘Inner Circle consistency for wireless ad hoc networks’, IEEE Trans, Mobile computing; pp.39-55.

. Djahel S, Nait-Abdesselam F, Khokhar A,(2011) ‘Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges, IEEE Commun; pp.658-672.

. Djenouri D, Badache N, (2005) ‘New approach for selfish nodes detection in mobile ad hoc networks’, in: Proceedings of the Workshop on First International Conference on security and privacy for Emerging Areas in Communication Networks(SecurComm); pp.288-294.

. Garcia-Teodoro P, Sanchez-Casado L, Macia-Fernandez G, (2014) ‘Taxonomy and holistic detection of security attacks in MANETs’, Security for Multihop Wireless Networks; pp. 1–12.

. Hayajneh T, Krishnamurthy P, Tipper D, Kim T, (2009) ‘Detecting malicious packet dropping in presence of collisions and channel errors in wireless ad hoc networks’, in: Proceedings of the IEEE International Conference on Communications (ICC);pp.1-6.

. Huang Y, Fan W, Lee W, Yu P S, (2003) ‘Cross-feature analysis for detecting ad- hoc routing anomalies’, in: Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS); pp. 478– 487.

. Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y,(2007) ‘Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method’, Int. J. Netw. Secur; pp.338–346.

. Leovigildo Sanchez C, Gabriel Macia F,Pedro Garcia T, Roberto Magan C,(2015) ‘A model of data forwarding in MANETs for lightweight detection of malicious packet dropping’, computer networks; pp.44-58.

. Marti S, Giuli T, Lai K, Baker M, (2000) ‘Mitigating routing misbehavior in mobile ad hoc networks’, in: Proceedings of the sixth Annual International Conference on Mobile Computing and Networking (MobiCom); pp. 255–265.

. H. Miranda, L. Rodrigues, Friends and foes: preventing selfishness in open mobile ad hoc networks, in: Proceedings of of the 23rd Interna tional Conference on Distributed Computing Systems Workshops (ICD- CSW), 2003, pp. 440–445

. A. Nadeem, M. Howarth, Adaptive intrusion detection & prevention of denial of service attacks in MANETs, in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing (IWCMC), 2009, pp. 926–930.

. C.E. Perkins, E.M. Belding-Royer, S.R. Das, Ad hoc on-demand distance vector (AODV) routing, IETF, RFC 3561 (2003).

. Rappaport T, Annamalai A, Buehrer A M, Tranter H,(2002) ‘Wireless communications past events and a future perspective’, IEEE Communications;pp.8–161.

. L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, An efficient cross-layer approach for malicious packet dropping detection in MANETs, in: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trust- Com), 2012, pp. 231–238.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.