CFP last date
20 May 2024
Reseach Article

Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

Published on None 2010 by D.Jeyabharathi, D.Sasireka, D.Kesavaraja
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 4
None 2010
Authors: D.Jeyabharathi, D.Sasireka, D.Kesavaraja
e906679e-2f30-4870-954f-2b6479f4158f

D.Jeyabharathi, D.Sasireka, D.Kesavaraja . Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment. Mobile Ad-hoc Networks. MANETS, 4 (None 2010), 206-210.

@article{
author = { D.Jeyabharathi, D.Sasireka, D.Kesavaraja },
title = { Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 4 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 206-210 },
numpages = 5,
url = { /specialissues/manets/number4/1043-46/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A D.Jeyabharathi
%A D.Sasireka
%A D.Kesavaraja
%T Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 4
%P 206-210
%D 2010
%I International Journal of Computer Applications
Abstract

In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There are several approaches available for fixed network threats. But it is difficult to analyze the intrusion attacks in mobile networks due to its high mobile nature. In this present work we implemented a simulation tool to handle intrusion attacks in Mobile Ad Hoc Network (MANET). Using that we analyzed Route Disturbance, Node Isolation, Resource Consumption, Denial of Service (DoS) and Man in the Middle attacks. Using our approach it is easy to reduce throughput, easy to increase security, easy to avoid unauthorized intruders and also it is easy to avoid packet losses.

References
  1. Anand, R., Nachiketh R. Potlapally, 2006. A study of the energy consumption characteristics of Cryptographic Algorithms and Security Protocols. IEEE Trans. Mob. Comput., 5(2), pp: 128-143. doi: 10.1109/TMC.2006.16
  2. Y. Zhang and W. Lee. Intrusion detection in wireless ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275–283. ACM Press, 2000.
  3. Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Mobile Networks and Applications (MONET), 2002.
  4. C.-Y. Tseng, P. Balasubramanyam, C. Ko, R.Limprasittiporn, J. Rowe, and K. Levitt. A specificationbased intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 125–134. ACM Press, 2003.
  5. Pirzada, Asad Amir, and McDonald, Chris. Establishing trust in pure ad-hoc networks. Proceedings of the 27th conference on Australasian Computer Science - Volume 26, pp 47-54, 2004
  6. Theodorakopoulos, George and Baras, John. Trust evaluation in ad-hoc networks. Proceedings of the 2004
  7. ACM workshop on Wireless security, pp. 1-10, 2004.
  8. Michiardi, P. and Molva, R., “Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks”, Communication and Multimedia Security 2002 Conference.
  9. Albers, Patrick and Camp, Olivier. Security in Ad hoc Networks: a general Intrusion detection architecture enhancing trust based approaches. Proceedings of the First International Workshop on Wireless Information Systems 2002.
  10. Sun, Bo, Wu, Kui and Pooch, Udo. Alert aggregation in mobile ad hoc networks. Proceedings of the 2003 ACM workshop on Wireless security, pp.69 – 78, 2003.
  11. Puttini, R; Percher, JM; Me, L, Camp, O; de Sousa, R. A Modular Architecture for a Distributed IDS for Mobile Ad Hoc Networks. Lecture Notes on Computer Science vol.2669, Springer-Verlag, pp. 91-113, 2003.
  12. Ngai, Edith C. H., and Lyu, M. R.. Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks. 24th International Conference on Distributed Computing Systems Workshops, vol. 04, pp. 582-587, 2004.
  13. Parker, J., Undercoffer, J. L., Pinkston, J., and Joshi, A. On Intrusion Detection in Mobile Ad Hoc Networks. In 23rd IEEE International Performance Computing and Communications Conference – Workshop on Information Assurance. IEEE, April 2004.
  14. S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (Mobicom ’00), pp. 275- 283, 2000.
  15. Karygiannis, A. and Antonakakis, E. mLab: A Mobile Ad Hoc Network Test Bed. 1st Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing in conjunction with the IEEE International Conference in Pervasive Services 2005, July 14, 2005.
  16. V. Madhu Viswanatham and A.A. Chari: An Approach for Detecting Attacks in Mobile Adhoc Networks in Journal of Computer Science 4 (3): 245-251, 2008 ISSN 1549-3636 © 2008 Science Publications ww.scipub.org/fulltext/jcs/jcs 43245-251.pdf
  17. Sarat Sreepathi, Vamsi Venigalla, Akshay Lal :A Survey Paper on Security Issues Pertaining to Ad-Hoc Networks www4.ncsu.edu/~sssreepa/Adhoc-networks-Security-Survey.doc
  18. Arun Kumar Bayya ,Siddhartha Gupte,Yogesh Kumar Shukla and Anil Garikapati : Security in Ad-hoc Networks www.cs.uky.edu/~singhal/term-papers/Fourth-paper.doc
Index Terms

Computer Science
Information Sciences

Keywords

MANET attacks detection node isolation route disruption resource consumption ADODV MIDC DoS Man in the Middle Attack