Loading

Deployment and Selection of Monitoring Nodes for Detection of Selfish Attacks in MANET
R. Mangayarkarasi1, R. Manikandan2

1R. Mangayarkarasi*, Assistant Professor, Department of Computer Science, Government Arts College, Trichy.
2Dr. R. Manikandan, Associate Professor, Department of Computer Science and Engineering, Sengipatti, Thanjavur. 
Manuscript received on March 12, 2020. | Revised Manuscript received on March 28, 2020. | Manuscript published on April 30, 2020. | PP: 2217-2221 | Volume-9 Issue-4, April 2020. | Retrieval Number: D6704049420/2020©BEIESP | DOI: 10.35940/ijeat.D6704.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: : Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are energy depletion, link disconnection, mobility and coverage. Hence the selection of monitoring nodes plays an important role in IDS. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks. In this technique, the whole network is virtually divided in smaller grid like zones. In each grid, the nodes with higher stability and better coverage are assigned a reward value. A cost metric is derived in terms of energy consumption and computational delay. Then the nodes with minimum cost and high reward are selected as monitoring nodes. By simulation results, it is shown that the proposed technique has reduced detection delay, energy consumption and detection overhead.
Keywords: MANET; DoS; Selfish Attack; IDS; misbehavior