Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Intrusion-Detection System Using an Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETS


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i8.2660

Abstract


The migration to wireless network from wired network has been a global trends in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme and a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction along with the EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


EAACK; MANET; Routing Misbehaviour; 2ACK; Wireless Network

Full Text:

PDF


References


Y. Kim, "Remote sensing and control of an irrigation system using a distributed wireless sensor network," IEEE Trans. Instrum.Meas., vol. 57, no. 7, pp. 1379–1387, Jul. 2008.
http://dx.doi.org/10.1109/TIM.2008.917198

H. Miranda and L. Rodrigues, "Preventing Selfishness in Open Mobile Ad Hoc Networks," Proc. Seventh CaberNet Radicals Workshop, Oct. 2002.

L. Buttyan and J.-P. Hubaux, "Security and Cooperation in Wireless Networks," http://secowinet.epfl.ch/, 2006.

L.M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE INFOCOM, 2001.

L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs," Proc. MobiHoc, Aug. 2000.

L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.

F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks," Proc. Seventh Int'l Workshop Security Protocols, 1999.

J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," Proc. IEEE Int'l Conf. Network Protocols (ICNP '01), 2001.

I. Aad, J.-P. Hubaux, and E-W. Knightly, "Denial of Service Resilience in Ad Hoc Networks," Proc. MobiCom, 2004.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehaviour in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.

T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes inMANETs," Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
http://dx.doi.org/10.1007/s00530-009-0166-0

B. Sun, "Intrusion detection in mobile ad hoc networks," Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004.

K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
http://dx.doi.org/10.1109/TMC.2007.1036

Rama Abirami, K., Sumithra, M.G., Rajasekaran, J., An efficient secure enhanced routing protocol for DDoS attacks in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (1), pp. 119-127.

J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, "Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project," IEEE Comm. Magazine, Jan. 2001.

M. Jakobsson, J.-P. Hubaux, and L. Buttyan, "A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks," Proc. Financial Cryptography Conf., Jan. 2003.
http://dx.doi.org/10.1007/978-3-540-45126-6_2

L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, 2003.
http://dx.doi.org/10.1023/A:1025146013151

S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. INFOCOM, Mar.-Apr. 2003.

S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug. 2000.

S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks," Proc. MobiHoc, June 2002.

L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs," Proc. MobiHoc, Aug. 2000.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Parkavi.K,Vivekanandan.P, "A framework for secure routing in mobile adhoc networks",IEEE.Int.conf.Advances in Engineering,science and manangement, March 2012,pp 467-472.

Parkavi.K,Vivekanandan.P, "Design of Context-Free Protocol for Secure Data Transmission in Mobile Ad hoc Networks", Proceedings of Dynamic Systems and Applications 6 (2012), USA,pp310-315.

da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation, 2 (4), pp. 270-275.

Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation, 1 (1), pp. 55-63.

Shankar, T., Shanmugavel, S., Karthikeyan, A., Hybrid approach for energy optimization in wireless sensor networks using PSO, (2013) International Journal on Communications Antenna and Propagation, 3 (4), pp. 221-226.

Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize