Open Access Open Access  Restricted Access Subscription or Fee Access

A Robust Intrusion Detection in Mobile Ad-hoc Networks with Reactive Routing Protocols

J. Jeba Veera Singh, A. Alfred Raja Melvin, J. Immanuel John Raja

Abstract


Mobile ad-hoc networks (MANETs) will be formed where a fixed network is not possible to be maintained. MANETs are infrastructure less and will be having mobile nodes. Security in mobile ad hoc networks is difficult to achieve, because of the dynamic topologies, limited resources, the absence of a certification authority and the lack of a centralized monitoring point [1]. MANETs are vulnerable to many kinds of attacks. Most of the attacks are routing protocol attacks. The routing protocol attacks will be carried out by forming holes in the network. The holes in the network can drop, tamper or fabricate the traffic in the network. The holes or the malicious nodes should be detected and detached as early as possible. The detection mechanism should also guarantee higher detection rate and lesser traffic. In this paper we propose a robust technique to detect the holes in the MANET which uses reactive routing protocol.

Keywords


MANET, Sinkhole Nodes, Routing Attacks, Bogus RREQ, Cross-Over Error Rate

Full Text:

PDF

References


A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, Wireless/Mobile Network Security, Chapter 12 2006 Springer.

A Review of Current Routing Attacks in Mobile Ad Hoc Networks, Rashid Hafeez Khokhar, Md Asri Ngadi & Satria Mandala, International Journal of Computer Science and Security, volume (2) issue (3)

Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators, H. Chris Tseng, B. Jack Culpepper, Computers & Security (2005) 24, 561-570

The dynamic source routing protocol for multi-hop wireless ad hoc networks, Johnson DB, Maltz DA, Broch J., In: EP C, editor. Ad Hoc Networking. Boston: Addison-Wesley; 2001. p. 139–72.

Collaborative techniques for intrusion detection in mobile ad-hoc networks., Marchang N, Datta R., Ad Hoc Networks 2008;6:508–23.

A cooperative-sinkhole detection method for mobile ad hoc networks., Gisung Kim, Younggoo Han, SehunKim, International Journal of Electronics and Communication 64 (2010) 390–397

An Analysis of Collaborative Attacks on Mobile Ad hoc Networks, Cong Hoan Vu, Adeyinka Soneye, Master Thesis, Computer Science, Thesis no: MCS-2009:4, June 2009

Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols, Irshad Ullah, Shoaib Ur Rehman, Master Thesis, Electrical Engineering, Thesis no: MEE-2010-2698, June, 2010

http://www.scribd.com/doc/36957710/Mitigating-Black-Hole-Attack-in-Manet

http://www.britannica.com/bps/additionalcontent/18/32588605/Prevention-of-Cooperative-Black-Hole-Attack-in-MANET

http://koasas.kaist.ac.kr/handle/10203/18729

http://www.seminarprojects.com/Thread-security-issues-in-manet-full-report

A distributed sinkhole detection method using cluster analysis, Woochul Shim , Gisung Kim, Sehun Kim, Expert Systems with Applications (2010), doi:10.1016/j.eswa.2010.05.028

Stefan K. Stafrace, Nick Antonopoulos Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks Computer Communications 33 (2010) 619–638.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.