An Algorithm to Detect Attacks in Mobile Ad Hoc Network
https://doi.org/10.1007/978-3-642-22203-0_30…
5 pages
1 file
Sign up for access to the world's latest research
Abstract
Each node in Mobile Ad Hoc Network (MANETs) communicates with each other to transfer the packet to destination node. Any anomalous behaviour of a node can confine it from executing this operation and even can disturb the whole network process. Therefore, the need of monitoring the nodes arises to keep a check on the behaviour of a node. In this paper, an algorithm is proposed to monitor the nodes & to check if a node is under attack or not. Moreover, a second layer of security is added which is furnished by a testbed to monitor the nodes.
Related papers
Mobile ad hoc network is a system of wireless mobile nodes that are dynamically self-organize in arbitrary and temporary topologies, with no fixed set of communication infrastructure and lack centralized administration, where network devices are inter-connected through wireless interface. Mobile nodes in Mobile ad-hoc Networks not only act as a host but as a router or relay stations for forwarding packets from source to destination. The dynamic nature and other characteristics of MANETs such as nodes mobility dynamic and topological changes makes it highly susceptible to various security attacks ranging from collaborative black hole/ gray hole attacks, sink hole attacks to eavesdropping attacks. The mentioned attacks mainly disrupt the routing process by giving false routing information in MANETs, thus finding safe routing path by avoiding malicious nodes is a genuine challenge. The research work aim at in cooperating RSA encryption algorithm to the cooperative bait detection scheme. The proposed work allow the source to use public key crypto system (in this case RSA) to encrypt data before transmitting it to the destination after the initial reverse tracing operations, it eliminate the used threshold value to indicate the reoccurrence of malicious nodes, it also eliminate the use of confirmation RREQ, since the public key cryptosystem introduced by the proposed work is sufficient enough to cover the transmitted data from an unknown attacker. The research work was simulated using network simulator tool NS2 and simulation results shows that the proposed works show an increase in packet delivery ratio, and a remarkable decrease in routing overhead.
2014
The mobile ad-hoc networks (MANET) is a new wireless technology, having features like dynamic topology and self-configuring ability of nodes. The self -configuring ability of nods in MANET made it popular among the critical mission such as military use and emergency recovery. But due to the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. So to protect MANET from various attacks, it is crucial to develop an efficient secure intrusion-detection system for MANET. In this paper, we focus on various intrusion-detection system in MANETs. Keywords— Intrusion detection system,Malicious nodes, Misbehaviour report, Acknowledement.
Proceedings of National Conference on Recent Trends in Parallel Computing (RTPC - 2014)
The mobile ad-hoc network is more exposed to being attacked, their some fundamental Properties, such as dynamic topology, limited power and limited bandwidth, it is very hard to achieve absolute security in the mobile ad hoc network. Attack avoidance method like encryption and authentication are not enough for reducing the possibilities of attacks. However, these methods are designed to prevent for a set of possible known attacks. These methods are not able to prevent newer attacks that are originated in the existing security measures. So, the mechanism is needed to detect and response for these newer attacks. This paper explores and classifies current techniques of Intrusion Detection System (IDS) on MANET and we have study various intrusion detection techniques in MANET.
Mobile Ad hoc NETworks (MANET) have the incredible growth in modern years. Mobile ad hoc networks are fast popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities. MANET is a dynamic network and there is no permanent structure and also no central administration. For these kind of networks, protection is the most essential service to provide protection and prevent malicious attacks occurring in the mobile nodes. The character and configuration of MANET makes it gorgeous to various types of attackers and do some unnecessary activities with the mobile nodes. In this proposed work we are discussed about various types of attacks and in particularly with active attacks which are occurring in the network layer of the Mobile ad hoc networks.
International Journal of Engineering Sciences & Research Technology, 2013
Mobile Ad-hoc Network (MANET) is an Emerging Technology. MANET is a great strong point to be applied in dangerous situations like battlefields and commercial applications such as construction, traffic surveillance. Each device in a MANET is without free to move in any direction and its changes the connections to other devices frequently. Mobile Ad-hoc network is faces several challenges such as Energy, Routing, Security, Quality of services, Memory and etc... But the flexibility in such atmosphere has the challenged in risk of security. The main Intrusion Detection is one of the possible ways in recognizing possible attacks before the system could be penetrate. The encryption and authentication solution are consider as the first line of protection, are no longer enough to protect MANETs. This paper defines several MANET security threats and focuses on MANET intrusion detection methods.
2011
Ad hoc wireless networks are defined as the category of wireless networks that utilizes multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure hence, they are called infrastructure less networks. The lack of any central coordination makes them more vulnerable to attacks than wired networks. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure therefore, detection should be added as another defense before an attacker can breach the system. Network intrusion detection is the process of monitoring the events occurring in the network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality. In this paper, we define and discuss various techniques of Intrusion Detection. We also present a description of routing protocols and types of security attacks possible in the network.
International Journal of Computer Applications, 2013
MANETs are dynamic peer-to-peer networks, which employ multi-hop information transfer without requiring an infrastructure. Due to their nature, they have unique security requirements. Traditional security mechanisms used in infrastructure networks may be inapplicable to MANETs. For example, the dynamic and transient nature of MANETs can result in constant changes in trust among nodes. MANETs suffers from not only the vulnerabilities as their infrastructure counterparts, but also peculiar threats and attacks (e.g., sleep deprivation, selfish misbehaving and Denial of Service (DoS) attacks) caused by unique characteristics of MANETs. Also, once a route is formed, any node in the route may turn malicious and may refrain from forwarding packets, modify them before forwarding or may even forward to an incorrect intermediate node. In this paper they proposed a flow based detection approach that uses novel detection features to identify the attacks in MANET. In our simulation, the results show that the secure is still efficient in discovering secure routes compared with normal model in MANET.
Proceedings of 6th …, 2004
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to overcome the attack of initiating / forwarding fake Route Requests (RREQs) that lead to hogging of network resources and hence denial of service to genuine nodes. In this paper, a proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node. Since the proposed scheme is distributed in nature it has the capability to prevent Distributed DoS (DDoS) as well. The performance of the proposed algorithm in a series of simulations reveal that the proposed scheme provides a better solution than existing approaches with no extra overhead.
2013
With the progression of computer networks extending boundaries, Mobile ad hoc network (MANET) has more easy technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are easier to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics, such as dynamic topology, open medium, limited power and limited bandwidth. The Prevention methods like authentication techniques and cryptography techniques and algorithms alone are not able to provide the security to these types of networks. so, efficient intrusion detection must be made to facilitate the identification and isolation of attacks. In this paper, we have surveyed several techniques for intrusion detection in MANET
International Journal of Computer Sciences and Engineering, 2018
Mobile Ad hoc Network (MANET) provides on the fly solution for those areas where wired network implementation is difficult. MANETs are network without infrastructure. They do not have central control. All nodes help each other in data communication. The life span of MANET is very small. The main features of MANET are: nodes are dynamic in nature resources availability in scarce and open channel. Due to resource scarcity some nodes may not provide their services to other nodes and some nodes may not participate in data transmission, to save their resources and they become selfish node. MANETs are susceptible for attacks. The open channel, resource scarcity and deployment type of network attract intruders for malicious activities. This survey paper has reviewed various articles from 1999 to 2018, in the view to look at how malicious nodes in a network make attacks on other nodes and what impact goes on network. Earlier work have been discussed about one or two types of attacks. This paper has studied and tried to bring all attacks under the one umbrella. The paper discussed these attacks in following categories: External and internal, active and passive, at protocol stack layer, security goals, attacks affecting routing. This paper also come along with defense line, have been proposed by various researchers for different attacks. Paper also tries to put attacks and their effect on one place. It includes type of attack, status of attacker, interaction, layer and security goals. It is suggested that what type of, defense, line of action should be taken, so that a network must sustain in adverse situation and available for its users.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.