CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:Intrusion Response System in AODV for MANET

by Manoj Kumar, Akshay Girdhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 12
Year of Publication: 2010
Authors: Manoj Kumar, Akshay Girdhar
10.5120/1298-1797

Manoj Kumar, Akshay Girdhar . Article:Intrusion Response System in AODV for MANET. International Journal of Computer Applications. 7, 12 ( October 2010), 30-36. DOI=10.5120/1298-1797

@article{ 10.5120/1298-1797,
author = { Manoj Kumar, Akshay Girdhar },
title = { Article:Intrusion Response System in AODV for MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 12 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number12/1298-1797/ },
doi = { 10.5120/1298-1797 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:08.247027+05:30
%A Manoj Kumar
%A Akshay Girdhar
%T Article:Intrusion Response System in AODV for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 12
%P 30-36
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile adhoc network (MANET) requires effective intrusion response system. In this paper, we present an intrusion response system that supports the infrastructureless nature of MANETs. We propose a NHELLO and Link Layer based solution towards excluding malicious node which is robust against address spoofing from the attacker. In particular, we investigate how power adaption can be used to keep a malicious node away from normal node’s transmission range. Important issue in this strategy is to select optimal transmission power so that malicious node goes out of operating zone of network, as well as node adapting power itself remains in the operating zone. We also provide a detailed performance evaluation based on various network parameters i.e. a series of simulation studies. Our results show that the proposed concept significantly improves the overall security of mobile ad hoc network without having geographical information of nodes.

References
  1. A. Srinivasan, Jie Wu, “A Survey on Secure Localization in Wireless Sensor Networks,” in Encyclopedia of Wireless and Mobile Communications, CRC Press, 2007
  2. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei “A survey of attacks and countermeasures in MANET”, Wireless Network Security Signals and Communication Technology, 2007, Part II, 103-135, DOI: 10.1007/978-0-387-33112-6_5
  3. C.E. Perkins, Ad Hoc Networking. Addison Wesley Professional, Dec. 2000. IEEE On page(s): 598 - 610 , Volume: 23 Issue: 3, March 2005
  4. Douglas M.Blough, Mauro Leoncini, Giovanni Resta, Paolo Santi, “The K-Neigh Protocol for Symmetric Topology Control in Ad Hoc Networks,” in Proc. of MobiHoc, 2003.
  5. Heady, R., Luger, G., Maccade, A., Servilla, M., “The architecture of a Network Level Intrusion Detection System”, Technical report, Computer science Department, University of New Mexico, August 1990
  6. I. A. Getting, “The Global Positioning System,” IEEE Spectrum, vol. 30, no. 12, pp. 36–38, 43–47, December 1993
  7. I. Siomina and D. Yuan, “Maximizing Lifetime of Broadcasting in Ad Hoc Networks by Distributed Transmission Power Adjustment,” in Proc. of ICTON, 2006
  8. Jagpreet Singh, Paramjeet Singh and Shaveta Rani “Enhanced Local Repair AODV (ELRAODV)” 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
  9. Kevin Fall and Kannan Varadhan, “The ns Manual”, editors, NS-Documentation, http://www.isi.edu/nsnam/ns/ns-documentation.html.
  10. Martin Mauve and Jorg Widmer, “A Survey on Position-Based Routing in Mobile Ad Hoc Networks,” IEEE Network Magazine, vol. 15,no. 6, pp. 30–39, November 2001
  11. Perkins, E. Belding-Royer, S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, RFC3561, IETF MANET Working Group, July 2003.
  12. R. Ramanathan and R.Rosales-Hain, “Topology Control of Multihop Wireless Networks using Transmit Power Adjustment,” INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 2000
  13. S. Basagni, I. Chlamtac, V. R. Syrotiuk, B. A. Woodward, “A Distance Routing Effect Algorithm for Mobility (DREAM),” International conference on Mobile Computing and Networking pages: 76-84, 1998.
  14. S-J. Park and R. Sivakumar, “Load-Sensitive Transmission Power Control in Wireless Ad-hoc Networks,” in Proc. of GLOBECOM, 2002.
  15. S. Singh, Mike Woo, C.S. Raghavendra, “Power-Aware Routing in Mobile Ad Hoc Networks,” Dallas, Texas, United States Pages: 181 - 190 Year of Publication: 1998 ISBN:1-58113-035-X in Proc. of MobiCom, 1998
  16. Wang, Hong Peng, Cui, Lin., “An enhanced AODV for mobile ad hoc network” international Conference on Machine Learning and Cybernetics, 2008 Volume 2, 12-15 july 2008 Page(s):1135 – 1140.
  17. Young-Bae Ko, Nitin H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks,” Volume 6, Issue 4 (July 2000) Pages: 307 - 321 Year of Publication: 2000 ISSN: 1022-0038 in Proc. of MobiCom, 1998.
  18. Zhang, Y., Lee, W., “Intrusion Detection on Wireless Ad hoc Networks”, in Proceedings 6th Annual International Conference on Mobile Computing and Networking (MobiCom’00), August 2000
Index Terms

Computer Science
Information Sciences

Keywords

Blackhole Attack IRS IDS Power adaption