Author : Chandini K.C 1
Date of Publication :17th May 2017
Abstract: Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes. MANET is preferred in variety of applications such as military, disaster stuck areas, emergency recovery etc. MANET is vulnerable to various attacks due to its open medium and wide distribution of nodes. This itself emphasize the importance of security and need for an efficient system, for example intrusion detection system in MANET. The Misbehavior such as, delay or drop in data packets or acknowledgement packets, drop packets and modify routing information etc. are present. These Misbehavior need to be detected well in advance to keep network secure. In this paper we propose and implement, new IDS named as Secure Acknowledgement (ACK) System. The Secure ACK system is purely an acknowledgement based technique. The type of Misbehavior detected by proposed system is about delay in packet transmission. In this system, for every three consecutive nodes in the route, the third node is required to send back an acknowledgement packet to the first node in the group. Based on the non-receipt of ACK packet within predefine time to the first node in the group, it reports about Misbehavior activity in the network. As soon as the proposed system detects misbehaving node present in the network, it stops the further data transmission. So, the misbehaving node will not be able to damage network thereafter.
Reference :
-
- I. Hatware, A. Kathole and M. Bompilwar, “Detection of Misbehaving Nodes in Ad Hoc Routing,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, February 2012.
- Rasika Mali and Sudhir Bagade, “Techniques for Detection of Misbehaving Nodes in MANET: A Study,” International Journal of Scientific & Engineering Research, vol. 6, Issue 8, August 2015.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 255-265.
- N. Nasser and Y. Chen, “Enhanced Intrusion Detection Systems for Discovering Malicious Nodes in Mobile Ad Hoc Network,” in Proceedings of the IEEE International Conference on Communications, Glasgow, Scotland, pp. 1154–1159, June 24–28 2007.
- Arockia Rubi and Vairachilai, “A Survey on Intrusion Detection System in Mobile Adhoc Networks,” International Journal Of Computer Science And Mobile Computing, vol. 2, issue 12, pp. 389-393, December. 2013
- T. Anantvalee and J. Wu. “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless / Mobile Security, New York: Springer-Verlag, 2008.
- I. Hatware, A. Kathole and M. Bompilwar, “Detection of Misbehaving Nodes in Ad Hoc Routing,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, February 2012.
- Rasika Mali and Sudhir Bagade, “Techniques for Detection of Misbehaving Nodes in MANET: A Study,” International Journal of Scientific & Engineering Research, vol. 6, Issue 8, August 2015.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 255-265.
- N. Nasser and Y. Chen, “Enhanced Intrusion Detection Systems for Discovering Malicious Nodes in Mobile Ad Hoc Network,” in Proceedings of the IEEE International Conference on Communications, Glasgow, Scotland, pp. 1154–1159, June 24–28 2007.