CFP last date
20 May 2024
Reseach Article

A Cross Layer Approach for Intrusion Detection in MANETs

by Sandeep Sharma, Rajesh Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 9
Year of Publication: 2014
Authors: Sandeep Sharma, Rajesh Mishra
10.5120/16245-5802

Sandeep Sharma, Rajesh Mishra . A Cross Layer Approach for Intrusion Detection in MANETs. International Journal of Computer Applications. 93, 9 ( May 2014), 34-41. DOI=10.5120/16245-5802

@article{ 10.5120/16245-5802,
author = { Sandeep Sharma, Rajesh Mishra },
title = { A Cross Layer Approach for Intrusion Detection in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 9 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number9/16245-5802/ },
doi = { 10.5120/16245-5802 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:23.327406+05:30
%A Sandeep Sharma
%A Rajesh Mishra
%T A Cross Layer Approach for Intrusion Detection in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 9
%P 34-41
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we propose a cross layer approach to detect the malicious node (Black hole attack) in MANET. In this approach, the malicious node is detected by the collaborative decision made by the network layer, MAC layer and physical layer on the basis of the parameters passed by the physical and the link layer to the network layer using cross layer design, and then the best path is selected among the various paths between the source node and the destination node. The routing protocol which is used in the simulation is AODV. The malicious node is then deleted from the routing table and the performance of our technique is proved by the simulation of our system model using the network simulator NS-2.

References
  1. V. Srivastava and M. Motani, "The Road Ahead for the Cross-Layer Design," in Proc. of IEEE 2nd International Conf. on Broadband Networks, pp. 551-560,vol. 1, 2005.
  2. T. S. Rappaport et al. , "Wireless Communications: Past Events and a Future Perspective," IEEE Comm. Mag. , vol. 40, May 2002, pp. 148–61.
  3. Min-Hua Shao ; Ji-Bin Lin ; Yi-Ping Lee, "Cluster-based Cooperative Back Proppagation Network Approach for Intrusion Detection in MANET", IEEE10th International Conference on Computer and Information Technology (CIT), pp. 1627-1632, July 2010.
  4. C. Perkins, E. Belding-Royer, S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. Feb. 2003. http://www. ietf. org/internet-drafts/draftietf-manet-aodv-13. txt.
  5. V. Srivastava and M. Motani, "Cross-layer design: A survey and the road ahead," in IEEE Communications Magazine, pp. 112-119, December 2005.
  6. R. Ludwig, A. Konrad, A. D. Joseph, and R. H. Katz. "Optimizing the End-to-End Performance of Reliable Flows over Wireless Link". Wireless Networks,8(2/3):289–299, 2002.
  7. G. Thamilarasu, S. Mishra, and R. Sridhar, "A cross-layer approach to detect jamming attacks in wireless ad hoc net-works, in Military Communications Conference, MILCOM2006, Washington D. C, pp. 1–7, Oct 2006.
  8. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Communications, vol. 11, no. 1, pp. 48–60, Feb. 2004.
  9. H. Yih-Chun, and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 28–39, May/June 2004.
  10. C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance comparison of two ondemand routing protocols for ad hoc networks," IEEE Personal Communications Magazine special issue on Ad hoc Networking, pp. 16–28, Feb. 2001.
  11. Hwee Xian TAN and Winston K. G. SEAH, "Dynamic Topology Control to Reduce Interference in MANETs" In proceedings of 2nd International Conference on Mobile Computing and Ubiquitous Networking, Osaka University Convention Centre, Osaka, Japan, 2005.
  12. A. Rajaram, Dr. S. Palaniswami, "A Trust-Based Cross-Layer Security Protocol for Mobile Ad hoc Networks" International Journal of Computer Science and Information Security, (IJCSIS) Vol. 6, No. 1, 2009
  13. V. Kotov and V. Vasilev, "A survey of Modern Advances in Network Intrusion Detection," in the proc. of 13th International Workshop on Computer Scince and Information Technology CSIT, pp. 18–21, 2011.
  14. John Felix Charles Joseph , Amitabha Das b, Bu-Sung Lee and Boon-Chong Seet , "CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS", Elsevier Computer Networks, 2010.
  15. Santoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, "A Self-Adaptive Intrusion Detection Method for AODV-based Mobile Ad Hoc Networks,"IEEE 2005.
  16. Yu Liu, Yang Li, and Hong Man, "Short Paper:A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks,"IEEE Computer Society ,2005.
  17. John Felix Charles Joseph , Amitabha Das, Boon-Chong Seet, and Bu-Sung Lee, "Cross layer versus Single Layer Approaches for Intrusion Detection in MANETs", pp. 194-199, IEEE 2007.
  18. Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi and Seung-Jo Han, "A Novel Cross Layer Intrusion Detection System in MANET," in the proc. of IEEE 14th International Conference on Advanced Information Networking and Applications, pp. 647-654, 2010.
  19. Arjun P. Athreya and Patrick Tague," Towards Secure Multi-path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-layer Strategy" 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Digital Object Identifier: 10. 1109/SAHCN. 2011. 5984886 , pp- 146 – 148, 2011.
  20. R. Senthil Kumar and P Kamalakkannan, "A Review and Design Study of Cross Layer Scheme Based Algorithm to Reduce the Link Break in MANETs," in the proc. of IEEE International Conference on Pattern Recognization, Informatics and Mobile Engineering, pp. 139-143, 2013.
  21. G. Thamilarasu, S. Mishra, and R. Sridhar, "A cross-layer approach to detect jamming attacks in wireless ad hoc net-works, in Military Communications Conference, MILCOM2006, Washington D. C, pp. 1–7, Oct 2006.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs AODV Cross Layer Intrusion Detection.