Author : R.Kathiroli 1
Date of Publication :7th June 2016
Abstract: MANET is a self configuring dynamic infrastructure-less wireless network of mobile nodes. The usage of MANET has increased over the past due its ability to form a network anywhere anytime. In addition to such advantages, the cons also follow because of its conditions like remote distribution and its dynamic link changes between nodes. The above stated conditions allow external or internal intruders to create attacks that is passive or active which degrades the efficiency of data transmission. The objective of this paper is to monitor the network activities and detect the presence of any intrusions of attackers. Once a malicious behaviour is noticed, it is ensured that it doesn't participate in the data transmission in the next routine. The addressed attacks are periodic dropping of data packets, periodic delaying of data packets and data packets reordering. We propose a novel algorithm to detect the attacker node and appoint a defense mechanism to isolate such attackers from taking part in the network activities and henceforth increasing the throughput.
Reference :
-
- A.M. Shabut, K.P Daha, S.K. Bista, and I.U. Awan, “Recom-mendation-based Trust Model with An Effective Defence Scheme for MANET,” IEEE Trans. on Mobile Computing, vol. 14, no. 10, pp.2102-2115, Oct. 2015
- E.H. Orallo, M.D. Olmos, J.C. Cano, C.T. Calafate, and P. Manzoni, “CoCoWa: A Collaborative ContactBased Watchdog for Detecting Selfish Nodes,” IEEE Trans. on Mobile Computing, vol. 14, no. 6, pp. 1162- 1175, June 2015.
- H. Shen, and Z. Li, “A Hierarchical AccountAided Reputation Management System for MANETs,” IEEE/ACM Trans. on Networking, vol. 23, no. 1, pp. 70-84, Feb. 2015.
- V. Laxmi, C. Lal, M.S. Gaur, and D. Mehta, “JellyFish Attack: Analysis, Detection and Countermeasure in TCP-based MANET,” Elsevier Ltd, vol. 22, pp. 99–112, June 2015
- P. Annadurai, and S. Vijayalakshmi, “Highly Reputed Authenticated Routing in MANET(HRARAN) ,” Springer, vol. 83, no. 1, pp. 452-475, Feb. 2015.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang, and N. Kato, “Cluster-based Certificate Revocation with Vindication Capability for Mobile Ad-Hoc Networks,” IEEE Trans. on Parallel and Distributed Systems, vol. 24, no. 2, pp. 239-249, Feb. 2013.
- U. Venkanna, A. Leela, and R. Velusamy, “A Cooperative Routing for MANET-based on Distributed Trust and Energy Management,” Springer Wireless Personal Communications, vol. 81, no. 3, pp. 962-979, Nov. 2014.
- A.M. Shabut, K. Dahal, and I. Awan, “'Friendshipbased Trust Model to Secure Routing Protocols in Mobile Ad-Hoc Networks,” IEEE Conference on Future IoT &Clous, Aug. 2014.
- Fahad Samad, Qassem Abu Ahmed, Asadullah Shaikh, Abdul Aziz, “JAM: Mitigating Jellyfish Attacks in Wireless Ad-Hoc Network,” Springer Wireless Networks, vol. 281, pp. 432-444, March 2012.
- A. Mishra, R. Jaiswal, and S. Sharma, “A Novel Approach for Detecting and Eliminating Cooperative Black Hole Attack using Advanced DRI Table in AdHoc Network,” Advance Computing Conference (IACC), IEEE 3rd International, pp. 499-504, Feb. 2013.
- Z.J. Haas, “The New Routing Protocol for The Reconfigurable Wireless Networks,” Proceedings of International Universal Personal Communications, vol. 2, pp. 562-566, Oct. 1997.
- A. Iwata, C.C. Chiang, G. Pei, M. Gerla, and T.W. Chen, “Scalable Routing Strategies for Ad-Hoc Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1369-1379, Aug. 1999.
- P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized Link State Routing Protocol for Ad-Hoc Networks,” Proceedings of Conference on Multi Topic, pp. 62-68, 2001.
- M. Joa-Ng, and I.T. Lu, “A Peer-To-Peer Zonebased Two-Level Link State Routing for Mobile AdHoc Networks,” IEEE Journal on Selected Areas in Communication, vol. 17, no. 8, pp. 1415-1425, Aug. 1999.
- D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad-Hoc Wireless,” Journal of Mobile Computing, vol. 353, pp. 153-181, 1996.
- A. Khannous, A. Rghioui, F. Elouaai, and M. Bouh-orma, “MANET Security: An Intrusion Detection System-based on The Combination of Negative Selection and Danger Theory Concepts,” Proceedings Of Fifth International Conference on Next Generation Networks and Services, pp. 88-91, May 2014.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang, and N. Kato, “Cluster-based Certificate Revocation with Vindication Capability for Mobile Ad -Hoc Networks,” IEEE Trans. on Parallel and Distributed Systems, vol. 24, no. 2, pp. 239-249, Feb. 2013.
- N. Mohammed, H. Otrok, L. Wang, M. Debbabi, and P. Bhatta-charya, “Mechanism Design-based Secure Leader Election Model for Intrusion Detection in Manet,” IEEE Trans. on Dependable and Secure Computing, vol. 8, no. 1, pp. 89-103, Jan.-Feb. 2011.
- C.S.R. Murthy, and B.S. Manoj, “Ad-Hoc Wireless Networks Architectures and Protocols,” Dorling Kindersley India Pvt. Ltd., India, 2006.
- S. Murthy, and J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks,” Jounal of Mobile Networks and Applications, vol. 1, no. 2, pp. 183-197, June 1996.
- V.D. Park, and M.S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proceedings of Sixteenth Annual Conference on Driving The Information Revolution, vol. 3, pp. 1405-1413, April 1997.
- G. Pei, M. Gerla, and T. Chen, “Fisheye State Routing:A Routing Scheme for Ad-Hoc Wireless Networks,” International conference on communications, vol. 1, pp. 70-74, 2000
- C.E. Perkins, and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” Proceedings of Conference on Communications Architectures, Protocols and Applications, pp. 234-244, Oct. 1994.
- C.E. Perkins, and E.M. Royer, “Adhoc OnDemand Distance Vector Routing,” Proceedings of Workshop on Mobile Computing Systems and Applications, pp.90-100, Feb. 1999.
- V. Raychoudhury, J. Cao, R. Niyogi, W. Wu, and Y. Lai, “Top K-Leader Election in Mobile Ad-Hoc Networks,” Journal of Pervasive and Mobile Computing, vol. 5, no. 22, pp. 181-202, Jan. 2013.