Academia.eduAcademia.edu

Outline

Detecting misbehaving nodes in MANETs

2010, Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services - iiWAS '10

https://doi.org/10.1145/1967486.1967522

Abstract

There has been a tremendous growth in the use of wireless communication in the past few decades. Mobile Ad hoc NETwork (MANET) is one of the most important one among various wireless communication mechanisms. In MANET, each node in a network performs as both a transmitter and a receiver. They rely on each other to store and forward packets. Its unique infrastructureless network and self-configuring capability makes it ideal for many mission critical applications, including military use and remote exploration. However, these characteristics also make MANET vulnerable to passive and active attacks due to its open medium, changing topology and lack of centralized monitoring. To address the new security challenges, Intrusion Detection System (IDS) is required to detect the malicious attackers before they can accomplish any significant damages to the network. Many existing IDSs for MANETs are based upon Watchdog mechanism. In this paper, we propose a new IDS called Enhanced Adaptive ACKnowledgement (EAACK) that solves four significant problems of Watchdog mechanism, which are ambiguous collisions, receiver collisions, limited transmission power and false misbehavior report. We use Network Simulator 2 to simulate the proposed mechanism and compare the results with existing mechanisms.

References (25)

  1. REFERENCES
  2. Buchegger, S. and Le Boudec, J-Y. 2002. Performance analysis of the CONFIDANT protocol: Cooperation of nodes, fairness in dynamic ad-hoc networks. In Proceedings ofMobiHoc'02.
  3. Buttyan, L. and Hubaux, J-P. 2000. Enforcing service availability in mobile ad-hoc WANs. In Proceedings of the 1st ACM international Symposium on Mobile Ad Hoc Networking & Computing (Boston, Massachusetts). International Symposium on Mobile Ad Hoc Networking & Computing. IEEE Press, Piscataway, NJ, 87-96.
  4. Buttyan, L. and Hubaux, J-P. 2007. Security and cooperation in wireless networks. Cambridge University Press (Aug. 2007)
  5. Feeney, L.M. and Nilsson, M. 2001. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In IEEE INFOCOM, 2001. 1548 - 1557 vol.3
  6. Hu, Y-C., Perrig, A., Johnson, D.: Ariadne. 2002. A secure on-demand routing protocol for ad-hoc networks. In Proceedings of the 8th ACM international Conference on Mobile Computing and Networking (Atlanta, GA).
  7. MobiCom'02. Modeling and Simulation Design. AK Peters Ltd., Natick, MA.
  8. Hu, Y-C., Johnson, D.B. and Perrig, A. 2002. SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications. Pp.3-13
  9. Hubaux, J-P., Gross, T., Boudec, Le and Vetterli, M. 2001. Toward self-organized mobile ad hoc networks: The terminodes project. In IEEE Communications Magazine.
  10. Jakobsson, M., Hubaux, J-P. and Buttyan, L. 2003. A micropayment scheme encouraging collaboration in multi- hop cellular networks. In Proceedings of Financial Crypto, Jan 2003.
  11. Jayakumar, G and Gopinath, G. 2007. Ad Hoc Mobile Wireless Networks Routing Protocol -A Review. In Journal of Computer Science 3(8): 574-582.
  12. Johnson, D.B., Broch, J., Hu, Y-C., Jetcheva, J. and Maltz, D.A.1998.TheCMUmonarchproject'sextensionstoNS.In Proceedings of the 42nd Internet Eng. Taskforce.
  13. Johnson, D-B. and Maltz, D-A. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile Computing. Editer by Toasz Imielinski and Hank Korth, chapter 5, 153- 181. Kluwer Academic Publishers. 1996
  14. Liu, K., Deng, J., Varshney, P. K., and Balakrishnan, K. 2007. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transactions on Mobile Computing 6, 5 (May. 2007), 536- 550. DOI= http://dx.doi.org/10.1109/TMC.2007.1036
  15. Marti, S., Giuli, T. J., Lai, K., and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (Boston, Massachusetts, United States, August 06 -11, 2000). MobiCom '00. ACM, New York, NY, 255-265. DOI= http://doi.acm.org/10.1145/345910.345955
  16. Murthy, S. and Garcia-Luna-Aceves, J. J. 1996. An efficient routing protocol for wireless networks. Mob. Netw. Appl. 1, 2 (Oct. 1996), 183-197. DOI= http://dx.doi.org/10.1007/BF01193336
  17. Nasser, N and Chen, Y. 2007. Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network. In Proceedings of IEEE International Conference on Communication. (Glasgow, Scotland, June 24 -28, 2007).ICC'07.
  18. Parker, J., Undercoffer, J., Pinkston, J. and Joshi, A. 2002. Secure routing for mobile ad-hoc networks. In Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference. (Texas, SA, 2002).CNDS'02.
  19. Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. SIGCOMM Comput. Commun. Rev. 24, 4 (Oct. 1994), 234-244. DOI= http://doi.acm.org/10.1145/190809.190336
  20. Sanzgiri, K., Dahill, B., Levine, B-N., Shields, C. and Belding-Royer, E-M. 1999. A review of current routing protocols for ad-hoc mobile wireless networks. Personal Communications Magazine, April 1999.
  21. Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. 2009. Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. International Journal of Multimedia Systems, Springer, vol. 15, issue 5, 273-282.
  22. Sun, B. 2004. Intrusion Detection in Mobile Ad Hoc Networks. Doctoral Dissertation. Texas A&M University.
  23. Wu, B., Chen, J., Wu, J. and Cardei, M.. 2006. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Xiao, Y., Shen, X. and Du, -Z, D. Net.
  24. Zhou, L. and Haas, Z. 1999. Securing ad-hoc networks. In IEEE Network Magazine. 13(6), 24-30
  25. Zhong, S., Chen, J. and Yang, Y.R. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of Infocom'03, San Francisco, CA, USA, March 30-April 2003.