Academia.eduAcademia.edu

Outline

A Flooding based IDS Security against Jamming Attack in MANET

Abstract

The attacker/s are easily modified or infected the routing performance by flooding unwanted packets in Mobile Ad hoc Network (MANET). Each node in MANET is performing the role of sender, receiver and intermediate node. In this open network Security is the one amongst the most important problem. The multipath routing has a benefit to reduce routing overhead in network by proving the alternative path if the already established path is fail in communication. In this paper, we propose the Intrusion Detection System (IDS) for Jamming attack. The proposed IDS is reliable and provides a secure path for exchanging information. In multipath routing, the possibility of secure routing is enhanced in the presence of an attacker and proposed IDS able to handle it. The jamming attacker slowlyslowly injected the packets in network and these packets quantity is rapidly enhance according to time instance. After some time the attacker is consuming the link capacity by that communication between the n...

References (15)

  1. S. Madhavi, "An Intrusion Detection System In Mobile Ad hoc Network", International Journal of Security and Applications, Vol. 2, No. 3, pp. 1-16, July 2008.
  2. V. P. and R. P. Goyal, "MANET: Vulnerabilities Challenges Attacks Application", IJCEM International journal of process Engineering & Management, Vol. 11, pp. 32-37, January 2011.
  3. N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "Analyzing the Energy utilization of Security Protocols," Departure on of International conference of Low Power Electronics and Design (ISLPED '03), 2003.
  4. Elizabeth M. Royer, Chai-Keong Toh, "A analysis of existing Routing Protocols for ad hoc Mobile Wireless Networks", IEEE pathetic Communications, Vol. 6, No. 2, pp. 46-55, April 1999.
  5. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, "Review of a variety of Routing Protocols for MANETS" , International Journal of Information and Electronics Engineering, Vol. 1, No. 3, pp. 251-259, November 2011.
  6. P. Yi, Z. Dai, S. Zhang, Y. Zhong, "A New Routing Attack In Mobile ad hoc Networks", International Journal of information technology, vol. 11, no. 2, pp. 83-94, 2005.
  7. Yongguang Zhang and Winke Lee, "Security in Mobile Ad- Hoc Networks", In volume ad hoc Networks technologies and Protocols (Chapter 9), Springer, 2005.
  8. P. Papadimitratos and Z. J. Hass, "Secure routing for Mobile ad hoc Networks", In measures of SCS Communication Networks and Distributed Systems model and Simulation Conference (CNDS), san Antonio TX, January 2002.
  9. Amitabh Mishra and Ketan M. Nadkarni, "Security in Wireless Ad hoc Networks", In volume the instruction book of ad hoc Wireless Networks, CRC Press LLC, 2003.
  10. Aleksi Marttinen, Alexander M. Wyglinski, Riku Jantti, "Statistics-based jamming Detection algorithm for jamming Attacks Against considered MANETs", IEEE Military Communications Conference, pp. 501-506, 2014.
  11. Hussein Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, and Adrian Perrig, "Jamming-Resilient Multipath Routing", IEEE Transactions on Dependable And Secure Computing, Vol. 9, No. 6, pp. 852-863, November/December 2012.
  12. Detection", IEEE Transactions on Network and S Fenye Bao, Ing-Ray Chen, Moon Jeong Chang, and Jin-Hee Cho, "Hierarchical Dependence Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion ervice Management, Vol. 9, No. 2, pp. 169-182, June 2012.
  13. Preeti Sachan, Pabitra Mohan Khilar, "Security Attacks and solution in MANET", Proceedings of International Conference on Advances in Computer Engineering, pp. 172-177, 2011.
  14. Pravina Dhurandher, "FACES: Friend based ad hoc Routing with challenge to establish security in MANET Systems", IEEE SYSTEMS Journal, Vol. 5, No 2, pp. 176-188, June 2011.
  15. The Network Simulator NS-2 content available on link https://www.isi.edu/nsnam/ns/ns-build.html