Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics

  • Ganesan A Department of Computer Applications, Hindusthan Arts College, Coimbatore–641028, Tamil Nadu, India.
  • Kumar Kombaiya A Department of Computer Science, Chikkanna Government Arts College, Tirupur-641602, Tamil Nadu, India.
Keywords: Malicious Node, DSR, Throughput, Latency, NS2, Packet Delivery Ratio, Energy Consumption, Intrusion Detection System


This paper describes a set of network metrics are helpful to predict behavior of malicious node in wireless network. The Network and internet is the device in which multiple people can communicate with each other through the wired or wireless media. Nowadays, Internet of Things, Mobile, vehicular, and wireless ad hoc networks all merge into one shared network. These networks are often used to send receive confidential data and information. The unauthorized or malicious node misuse these secrete information. With a rise in rogue nodes, network performance will suffer. A rogue node in the network can cause variations in network metrics including the packet dropping percentage, throughput, latency, energy consumption, and average queue duration. This behavior used to identify the malicious node.


Metrics Loading ...


The Network Simulator - ns-2.

Fall K., & Varadhan K, (2011). The ns Manual (formerly ns Notes and Documentation),

Chung, J., & Claypool, M. (2002). NS by example. Worcester Polytechnic Institute, Computer Science.

Wei, D.X., (2005). Speeding up NS-2 scheduler.

Das, S.R., Castaneda, R., Yan, J., & Sengupta, R., (1998). Comparative performance evaluation of routing protocols for mobile, ad hoc networks, In Proceedings 7th International Conference on Computer Communications and Networks, IEEE, 153- 161.

Sahu, P., Bisoy, S.K., & Sahoo, S., (2013). Detecting and isolating malicious node in AODV routing algorithm, International Journal of Computer Applications, 66 (16), 8- 12.

Khandakar, A., (2012). Step by step procedural comparison of DSR, AODV and DSDV routing protocol, 4th In International Proceedings of Computer Science &Information Techenology, 40 (12), 36-40.

Baliga, J., Ayre, R., Hinton, K., & Tucker, R.S., (2011). Energy consumption in wired and wireless access networks, IEEE Communications Magazine, 49(6), 70-77.

Rohini, R., & Gnanamurthy, R.K., (2016). A Simple and Efficient Malicious node detection system for improving the performance of the wireless sensor networks, International Journal of Applied Engineering Research, 11(1), 396-400.

Singh, R., Singh, J., & Singh, R. (2017). Fuzzy based advanced hybrid intrusion detection systemtodetect maliciousnodes inwirelesssensor networks, Wireless Communications and Mobile Computing, 2017, 1-14.

Sarigiannidis, P., Karapistoli, E., & Economides, A.A., (2015). Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information, Expert Systems with Applications, 42 (21), 7560-7572.

Maleh, Y., Ezzati, A., Qasmaoui, Y., & Mbida, M., (2015). A global hybrid intrusion detection system for wireless sensor networks, Procedia Computer Science, 52, 1047- 1052.

Adnan, A., Kamalrulnizam, A.B., Muhammad Ibrahim, C., Khalid, H., & Abdul Waheed, K., (2014) A Survey on Trust-Based Detection and Isolation of Malicious Nodes in Ad-Hoc and Sensor Networks, Frontiers of Computer Science (electronic), 9(2), 280-296.

Li, Z., Sun, J., Yan, Q., Srisa-an, W., & Bachala, S., (2018). Grandroid: Graph-based detection of malicious network behaviors in android applications, In International Conferenceon Securityand Privacy in Communication Systems, Springer, Cham, 254, 264-280.

Rajasekaran, B., & Arun, C., (2018). Detection of malicious nodes in wireless sensor networks based on features using neural network computing approach, International Journal of Recent Technology and Engineering, 7(4), 188-192.

How to Cite
A, G., & A, K. K. (2022). Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics. International Journal of Computer Communication and Informatics, 4(1), 1-10.

Views: Abstract : 20 | PDF : 17

Plum Analytics