Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network

作者: K. V. Arya , Prerna Vashistha , Vaibhav Gupta

DOI: 10.1007/978-3-642-21984-9_55

关键词: Ad hoc wireless distribution serviceIntrusion detection systemAuthenticationComputer scienceRouting protocolOptimized Link State Routing ProtocolWireless ad hoc networkComputer networkVehicular ad hoc networkMobile ad hoc network

摘要: MANET is an infrastructure less network where Routing Protocols play a vital role. Most of the routing protocols assume that all nodes in are fair and ready to co-operate with each other. In some can be selfish malicious which leads security concerns. Therefore, Intrusion Detection System (IDS) required for MANETs. MANETs, most Systems (IDSs) based on watchdog technique. These techniques also called overhearing suffer from problems. this paper effort has been made overcome problems technique by introducing additional phase authentication between route establishment packet transmission. Here, DSR modified so discovered will not have remaining power. Nodes sufficient transmission power taken into consideration at time discovery.

参考文章(11)
Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks acm/ieee international conference on mobile computing and networking. pp. 255- 265 ,(2000) , 10.1145/345910.345955
Sonja Buchegger, Jean-Yves Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks mobile ad hoc networking and computing. ,(2002)
Hisham Elshaer, Federico Boccardi, Mischa Dohler, Ralf Irmer, Load & backhaul aware decoupled downlink/uplink access in 5G systems 2015 IEEE International Conference on Communications (ICC). pp. 5380- 5385 ,(2015) , 10.1109/ICC.2015.7249179
A. Hasswa, M. Zulkernine, H. Hassanein, Routeguard: an intrusion detection and response system for mobile ad hoc networks wireless and mobile computing, networking and communications. ,vol. 3, pp. 336- 343 ,(2005) , 10.1109/WIMOB.2005.1512922
A. Al-Roubaiey, T. Sheltami, A. Mahmoud, E. Shakshuki, H. Mouftah, AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement advanced information networking and applications. pp. 634- 640 ,(2010) , 10.1109/AINA.2010.136
N. Nasser, Y. Chen, Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks international conference on communications. pp. 1154- 1159 ,(2007) , 10.1109/ICC.2007.196
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828
K. Balakrishnan, Jing Deng, P.K. Varshney, TWOACK: preventing selfishness in mobile ad hoc networks wireless communications and networking conference. ,vol. 4, pp. 2137- 2142 ,(2005) , 10.1109/WCNC.2005.1424848
Loay Abusalah, Ashfaq Khokhar, Mohsen Guizani, A survey of secure mobile Ad Hoc routing protocols IEEE Communications Surveys and Tutorials. ,vol. 10, pp. 78- 93 ,(2008) , 10.1109/SURV.2008.080407