CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure IDS against Sybil Attacker Routing Misbehavior in MANET

by Akanksha Jain, Abhishek Mathur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 11
Year of Publication: 2015
Authors: Akanksha Jain, Abhishek Mathur
10.5120/ijca2015907488

Akanksha Jain, Abhishek Mathur . Secure IDS against Sybil Attacker Routing Misbehavior in MANET. International Journal of Computer Applications. 131, 11 ( December 2015), 36-42. DOI=10.5120/ijca2015907488

@article{ 10.5120/ijca2015907488,
author = { Akanksha Jain, Abhishek Mathur },
title = { Secure IDS against Sybil Attacker Routing Misbehavior in MANET },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 11 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number11/23497-2015907488/ },
doi = { 10.5120/ijca2015907488 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:06.563649+05:30
%A Akanksha Jain
%A Abhishek Mathur
%T Secure IDS against Sybil Attacker Routing Misbehavior in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 11
%P 36-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sybil attacker is the routing layer active attacker that replies with multiple identification number (ID's) to nodes that forward request to attacker in a different time instant and drop the data forwarded to attacker after link establishment. The proposed research work is provides the novel secure Intrusion Detection System (IDS) against routing misbehavior of Sybil attack in MANET. The IDS are not determining whether the losses are caused by link errors. It determines the loss due to malicious nodes. In the especially interested in the insider Sybil attack case, whereby malicious nodes that are part of the route exploit their data of the communication context to drop an amount of packets critical to the network performance. The basic idea behind this method is that even though malicious dropping may result in a packet loss rate that is not comparable to normal channel losses. The attacker loss is more than the loss of channel. The proposed IDS is detecting attacker node that reply with multiple ID’s and broadcast the particular attacker original ID’s that generate fake ID’s. Therefore, by detecting the malicious or attacker loss % is decided whether the packet loss is purely due to a combined effect of fake ID’s for malicious drop. The routing performance is measured through performance metrics and detection through TPR and FPR. The simulation of attacker and proposed IDS is done in ns-2 simulator.

References
  1. G. Mobile Ad-hoc Networks (MANET). URL:http://www.ietf.org/html.charters/manet
  2. Charles E.Perkins. Ad hoc Networking, Addison-Wesley, 2001
  3. Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu, "Routing Security in Ad Hoc Wireless Networks", Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu Springer pp.1-32, 2005
  4. B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications Magazine, special issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Vol.14, No.5, pp. 56-63, October 2007.
  5. Adnan Nadeem and Michael P. Howarth, " A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks" IEEE Communications Surveys & Tutorials, Accepted for Publication, pp.1-19, 2013.
  6. Elizabeth M. Royer, Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communications, Vol. 6, No. 2, pp. 46-55,April 1999.
  7. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, "Review of Various Routing Protocols for MANETs", International Journal of Information and Electronics Engineering, Vol. 1, No. 3, pp. 251-259, November 2011.
  8. R. Vintoh kumar, Mr. P. Ramesh,Dr. H. Abdul Rauf, "Cluster Based Enhanced Sybil Attack Detection in MANET through Integration of RSSI and CRL", IEEE International Conference on Recent Trends in Information Technology, pp. 1-7, 10-12 April 2014.
  9. Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, and Kashif Kifayat, “Lightweight Sybil Attack Detection in MANETs” IEEE Systems Journal, Vol. 7, No. 2, pp. 236 -248, June 2013. .
  10. Himika Sharma and Roopali Garg, “Enhanced Lightweight Sybil Attack Detection Technique”, IEEE 2014 5th International Conference on The Next Generation Information Technology Summit (Confluence), 476 – 481, 25-26 September 2014.
  11. Athichart Tangpong, George Kesidis, Hung-yuan Hsu, Ali Hurson, “Robust Sybil Detection for MANETs”, IEEE Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN), pp. 1-6, 3-6 August 2009.
  12. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones “Deterring Whitewashing Attacks in Reputation Based Schemes for Mobile Ad hoc Networks”, IEEE Conference Wireless Days (WD), 2010 IFIP, pp. 1 – 6, 20-22 October 2010
  13. Yingying Chen, Jie Yang, Wade Trappe, and Richard P. Martin, “Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks” IEEE Transactions on Vehicular Technology, Vol. 59, No. 5, June 2010.
  14. A.Rajaram. Dr. S. Palaniswami “Malicious Node Detection System for Mobile Ad hoc Networks” International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 1, Issue 2 , pp.77-85, 2010.
  15. www.isi.edu/nsnam/ns/
Index Terms

Computer Science
Information Sciences

Keywords

Sybil attacker MANET IDS Routing Multiple Identities performance metrics ns-2