CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing Mobile Ad-hoc Network against Malicious Nodes

Published on November 2011 by Manish Chand Sahu, Rekha Pandit, Sunil Phulre
2nd National Conference on Information and Communication Technology
Foundation of Computer Science USA
NCICT - Number 1
November 2011
Authors: Manish Chand Sahu, Rekha Pandit, Sunil Phulre
7071cd9e-6da5-40f7-b528-ff68e131ea7a

Manish Chand Sahu, Rekha Pandit, Sunil Phulre . Securing Mobile Ad-hoc Network against Malicious Nodes. 2nd National Conference on Information and Communication Technology. NCICT, 1 (November 2011), 20-26.

@article{
author = { Manish Chand Sahu, Rekha Pandit, Sunil Phulre },
title = { Securing Mobile Ad-hoc Network against Malicious Nodes },
journal = { 2nd National Conference on Information and Communication Technology },
issue_date = { November 2011 },
volume = { NCICT },
number = { 1 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 20-26 },
numpages = 7,
url = { /proceedings/ncict/number1/4202-ncict005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Information and Communication Technology
%A Manish Chand Sahu
%A Rekha Pandit
%A Sunil Phulre
%T Securing Mobile Ad-hoc Network against Malicious Nodes
%J 2nd National Conference on Information and Communication Technology
%@ 0975-8887
%V NCICT
%N 1
%P 20-26
%D 2011
%I International Journal of Computer Applications
Abstract

Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. Route falsification attacks are easy to launch by malicious nodes in ad hoc networks. These nodes falsify data and routes in the network. Previous routing protocols in ad hoc networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. The focus of this paper is on anomaly detection techniques in order to exploit their main advantage of being able to detect unknown attacks. First, we briefly describe intrusion detection systems and then we suggest a distributed schema applicable to mobile ad hoc networks. This anomaly detection mechanism is based on a neural network and is evaluated for packet dropping attacks using features selected from the MAC layer.

References
  1. A. A. Cardenas, S. Radosavac, and J. S. Baras, “Detection and Prevention of MAC Layer Misbehavior in Ad Hoc Networks”, in Proceedings of the 2 ACM Workshop on Security of Ad Hoc and Sensor networks, pp. 17-22, October 2004.
  2. M. G. Zapata, and N. Asokan, “Securing Ad-Hoc Routing Protocols,”, in Proceedings of the 2002 ACM Workshop on Wireless Security, pp. 1-10, September 2002.
  3. Y. Zhang, W. Lee, Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks”, Wireless Networks Vol. 9, pp 545-556, 2003.
  4. Y. Huang, and W. Lee, “A Cooperative Intrusion Detect ion System for Ad Hoc Networks”,in Proceedings of the 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135-147, October 2003.
  5. H. Deng, Q. Zng, and D. P. Agrawal, “SVM-based Intrusion Detection System for Wireless Ad Hoc Networks”, In Proceedings of the IEE Vehicular Technology Conference (VTC‟03), Vol.3, pp 2147-2151, October 2003.
  6. O. Kachirski, and R. Guha, “Intrusion Detection Using Mobile agents in wireless Ad hoc Networks”, in Proceedings of the IEEE workshop on KnowledgeMedia Networking, pp.153-158, July 2002.
  7. Y.Liu,Y.Li,H.Man,“MACLayerAnomalyDetectioninAd Hoc Networks”, In Proceedings of 6 th IEEE Information Assurance Woskshop, June 17, 2005.
  8. Y. Huang, W. Fan, W. Lee, P.Yu, “Cross-Feature analysis for Detecting Ad-Hoc Routing Anomalies”, In Proceedings of the 23 rd International Conference on Distributed Computing Systems, pp.478, 2003.
  9. Tseng, P. Balasubramanyan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, “A specification-based Intrusion Detection system for AODV”, In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp.125-134, October 2003.
  10. Farooq Anjum, Dhanant Subhadrabandhu, Saswati Sarkar. “Signature-based Intrusion Detection for Wireless Ad-Hoce Networks.” In Proceedings of Vehicular Technology Conference, Wireless Security Symposium, Orlando, Florida, Oct. 2003.
  11. S. Haykin, “Neural Networks: A comprehensive Foundation”, Prentice-Hall, New Jersey, USA, 2 edition, 1999.
  12. A. Ultsch, “Data Mining and Knowledge Discovery with Emergent SOFMs for Multivariate Time Series”, In Kohonen Maps, (1999), pp. 33-46.
  13. A. Ultsch, “Maps for visualization of high-dimensional Data Spaces”, Proc. WSOM, Kyushu, Japan, (2003), pp. 225-230.
  14. Databionic ESOM Tools, Available from http://databionic-esom.sourceforge.net/devel.html
  15. Feiyi Wang, F. Gong, F.S. Wu, and R. Narayan. Intrusion detection for link state routing protocol through integrated network management. In Proceedings of the 8th International Conference on Computer Communications and Networks,pages 634–639, 1999.
  16. Jo˜ ao B. D. Cabrera, Lundy Lewis, Ravi K. Prasanth Xinzhou Qin, Wenke Lee, and Raman K. Mehra. Proactive detection of distributed denial of service attacks using MIB traffic variables – a feasibility study. In Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, USA, 2001.
  17. Y. Zhang and W. Lee. Intrusion detection in wireless ad hoc networks. In Proceedings of the sixth annual international conference on Mobile computing and networking, MOBICOM‟2000, pages 275–283. ACM Press New York, USA, 2000.
  18. D. Hagimont and L. Ismail. A protection scheme for mobile agents on java. In Proceedings of the 3rd Anual ACM/IEEE International Conference on Mobile Computing and Networking, pages 215–222, 1996.
  19. C. Perkins, “Ad-hoc on-demand distance vector routing,” Internet draft RFC, 1997.
  20. B. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing, 1996.
Index Terms

Computer Science
Information Sciences

Keywords

Emergent Self Organizing maps Denial of Service Intrusion Detect ion Wireless Ad Hoc Networks Neural Networks