CFP last date
20 May 2024
Reseach Article

An Intrusion Detection System for MANET Against Selective Packet Dropping

Published on February 2015 by Archana V, Maya Mohan
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 3
February 2015
Authors: Archana V, Maya Mohan
41f81fd3-fa5e-4f8a-9185-db38cb48766a

Archana V, Maya Mohan . An Intrusion Detection System for MANET Against Selective Packet Dropping. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 3 (February 2015), 26-30.

@article{
author = { Archana V, Maya Mohan },
title = { An Intrusion Detection System for MANET Against Selective Packet Dropping },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 3 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 26-30 },
numpages = 5,
url = { /proceedings/icaccthpa2014/number3/19450-6034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Archana V
%A Maya Mohan
%T An Intrusion Detection System for MANET Against Selective Packet Dropping
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 3
%P 26-30
%D 2015
%I International Journal of Computer Applications
Abstract

A MANET (mobile ad hoc network) is a self-configuring infrastructure-less network of mobile devices connected through a wireless medium. All the devices in MANET can move independently in any direction and frequently change its link to other devices. Each device can act as both a transmitter and receiver therefore MANET doesn't require a fixed network infrastructure. Self-configuring ability of MANET made it popular among critical mission applications like emergency recovery or military use. But MANET is vulnerable to malicious attackers due to open medium and wide distribution of the nodes. So, it's important to develop some efficient intrusion detection mechanisms to protect MANET from attacks. As a contribution to EAACK, an intrusion detection system for MANET a method is proposed to combat the selective packet dropping attack and reduce routing overhead and delay caused by EAACK. The proposed Intrusion Detection System for MANET against Selective Packet Dropping, as per the simulation results shows that it is efficient when compared to EAACK in case of select packet dropping attack and produces less RO and delay than EAACK.

References
  1. Shakshuki, Elhadi M. , Nan Kang, and Tarek R. Sheltami. "EAACK—a secure intrusion-detection system for MANETs. " Industrial Electronics, IEEE Transactions on 60. 3 (2013): 1089-1098.
  2. Anantvalee, Tiranuch, and Jie Wu. "A survey on intrusion detection in mobile ad hoc networks. " Wireless Network Security. Springer US, 2007. 159-180.
  3. Kang, Nan, Elhadi M. Shakshuki, and Tarek R. Sheltami. "Detecting misbehaving nodes in MANETs. " Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services. ACM, 2010.
  4. Kang, Nan, Elhadi M. Shakshuki, and Tarek R. Sheltami. "Detecting forged acknowledgements in MANETs. " Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on. IEEE, 2011.
  5. Liu, Kejun, et al. "An acknowledgment-based approach for the detection of routing misbehavior in MANETs. " Mobile Computing, IEEE Transactions on 6. 5 (2007): 536-550.
  6. Marti, Sergio, et al. "Mitigating routing misbehavior in mobile ad hoc networks. " Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000.
  7. Lee, Jin-Shyan. "A Petri net design of command filters for semiautonomous mobile sensor networks. " Industrial Electronics, IEEE Transactions on 55. 4 (2008): 1835-1841.
  8. Mishra, Amitabh, Ketan Nadkarni, and Animesh Patcha. "Intrusion detection in wireless ad hoc networks. " Wireless Communications, IEEE 11. 1 (2004): 48-60.
  9. Buchegger, Sonja, and Jean-Yves Le Boudec. "Performance analysis of the CONFIDANT protocol. " Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. ACM, 2002.
  10. Michiardi, Pietro, and Refik Molva. "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. " Advanced Communications and Multimedia Security. Springer US, 2002. 107-121.
  11. Balakrishnan, Kashyap, Jing Deng, and Pramod K. Varshney. "TWOACK: preventing selfishness in mobile ad hoc networks. " Wireless Communications and Networking Conference, 2005 IEEE. Vol. 4. IEEE, 2005.
  12. Hongwei, Ma. "The study on ad hoc networks security strategy based on Routing Protocols. " Computer Science and Network Technology (ICCSNT), 2011 International Conference on. Vol. 1. IEEE, 2011.
  13. Rivest, Ronald L. , Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems. " Communications of the ACM 21. 2 (1978): 120-126.
  14. Frodigh, Magnus, Per Johansson, and Peter Larsson. "Wireless ad hoc networking-The art of networking without a network. " Ericsson Review 4. 4 (2000): 249.
  15. Yang, Hao, et al. "Security in mobile ad hoc networks: challenges and solutions. " Wireless Communications, IEEE 11. 1 (2004): 38-47.
  16. Chlamtac, Imrich, Marco Conti, and Jennifer J-N. Liu. "Mobile ad hoc networking: imperatives and challenges. " Ad Hoc Networks 1. 1 (2003): 13-64.
  17. Sun, Bo, Kui Wu, and Udo W. Pooch. "Alert aggregation in mobile ad hoc networks. " Proceedings of the 2nd ACM workshop on Wireless security. ACM, 2003.
  18. Sterne, Daniel, et al. "A general cooperative intrusion detection architecture for MANETs. " Information Assurance, 2005. Proceedings. Third IEEE International Workshop on. IEEE, 2005.
  19. Royer, Elizabeth M. , and Chai-Keong Toh. "A review of current routing protocols for ad hoc mobile wireless networks. " Personal Communications, IEEE 6. 2 (1999): 46-55.
  20. Aarti, Dr SS. "Tyagi,"Study Of Manet: Characteristics, Challenges, Application And Security Attacks". " International Journal of Advanced Research in Computer Science and Software Engineering 3. 5 (2013): 252-257.
  21. Hinds, Alex, et al. "A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET). " International Journal of Information and Education Technology 3. 1 (2013).
  22. Gagandeep, Aashima, and Pawan Kumar. "Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review. " International Journal of Engineering and Advanced Technology (IJEAT) 1. 5 (2012).
  23. Wazid, Mohammad, Rajesh Kumar Singh, and R. H. Goudar. "A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some available Detection Techniques. " Proceedings published by International Journal of Computer Applications (IJCA) International Conference on Computer Communication and Networks CSI-COMNET, Hawaii. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Enhanced Adaptive Acknowledgement (eaack) Mobile Ad-hoc Network (manet) Misbehavior Report Authentication (mra) Routing Overhead (ro) Packet Delivery Ratio (pdr)