Open Access Open Access  Restricted Access Subscription or Fee Access

Maximizing the Channel Throughput in Mobile Ad Hoc Networks Using mIDS

S. Madhavi, Dr. I. Ramesh Babu

Abstract


Maximizing the channel throughput capacity and providing security for nodes in the mobile adhoc networks is becoming an attractive challenge for many researchers today. The nodes in the mobile adhoc networks move from one region to another. But still they demand for the security for their transactions. Today’s firewalls and encryption software’s are not sufficient and effective to protect the networks. An intrusion detection system (IDS) is required to monitor the network, detect the misbehaviors or anomalies and notify other nodes in the network to avoid or punish the misbehaving nodes. Because of these misbehaving nodes the network performance degrades. Hence a method is proposed to identify and control the misbehaving nodes so as identify the misbehaving nodes, and control their behavior. This ultimately improves the channel throughput. We proposed a new mIDS (Mobile Intrusion Detection System) suitable for multi-hop ad-hoc wireless networks in [2][4][5][6][7] which detects nodes misbehavior, anomalies in packet forwarding, such as intermediate nodes dropping or delaying packets. mIDS does relay on overhearing packet transmissions of neighboring nodes. In [8][9][10] we proposed a new scheduling method which improves the channel efficiency and network capacity.

In this paper we evaluated the metrics like

1. Packet dropping
2. Minimize the Control packet overhead on the nodes
3. Maximize the Channel throughput
in mobile adhoc networks using the mIDS protocol.


Keywords


CDMA, Dos, IDS, mIDS, QoS, TDMA

Full Text:

PDF

References


SMadhavi, ”Long Term Security for signed documents”, International conference procedding IMACS, At Satya sai Institute of Technology, Puttapathi, India

S. Madhavi, Dr. I Ramesh Babu, ”An intrusion detection system in mobil adhoc networks”, procedings of National conference, Siddhartha College of Engineering, India.

S. Madhavi, Dr. I. Ramesh Babu, ”Security in Mobile Adhco Networks:Its challenges and Solutions”, National conference procedeeings, Siddhartha College of Engineering, India, 2007

S. Madhavi, Dr I. Ramesh Babu”Security in Modie Adhoc Networks :Its challenges and Solutions”, Vol1 Issue 6 Jornal of compuee science, India.

S. Madhavi”An Intursion Detection System for Mobile Adhoc Networks”Proceddeings of International conference ISA ‘ 08, Korea, IEEEXplore.

S. Madhavi, Dr Tai Hoon Kim”An Intursion Detection System for Mobile Adhoc Networks”, IJSIA, Vol2 No 3 Issue 1 May 2008.

S. Madhavi, Dr. Tai Hoon Kim, Julian Dermoudy, Byeong Ho KANG”A Reputation Based Intrusion Detection System In Mobile Adhoc Networks Using Set Based Monitor Election Protocol”, Masaum Journal of computing Vol 1s Issue 1 August 2009.

S. Madhavi, Dr I. Ramesh Babu”Adaptive transmission scheduling in mobile adhoc networks”JCS, India, Vol 2 Issue 3 March 2008

S. Madhavi, Dr. I Ramesh Babu”A new adaptive transmission scheduling in mobile adhco networks”IJCSNS, Vol 1 March 2008.

S. Madhavi, ”A new adaptive transmission scheduling in mobile adhoc networks”Proceddings of international conference ICNS, IEEEXplore 2008.

S. Buchegger and J. L. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes | fairness in dynamic ad-hoc networks. In Proceedings of IEEE/ACM Symposium on Mobile AdHoc Networking and Computing (MobiHoc), Lausanne, CH, June 2002. IEEE.

D. Denning. An intrusion detection model. IEEE Transactions on Software Engineering, 13(2), Feb 1987.

Yi-an Huang, Wenke Lee, ”A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), Fairfax, Virginia, October 31, 2003.

Kashan Samad, Ejaz Ahmed, Waqar Mahmood, ”Simplified Clustering Scheme for Intrusion Detection in Mobile Ad Hoc Networks”, 13th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, September 15-17, 2005.

P. Krishna, N. H. Vaidya, M. Chatterjee, D. K. Pradhan:”A cluster-based approach for routing in dynamic networks”, ACM SIGCOMM Computer Communication Review, 27(2):49-64, 1997.

S. Cheung and K. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop, 1997.

Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275–283, 2000.

R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom and K. Thurber. Techniques for Intrusion-Resistant Ad hoc Routing Algorithms (TIARA). In MILCOM, volume 2, pages 660–664, Oct 2000.

S. Marti and T. J. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255–265, 2000.

L. Butty´an and J. P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In IEEE/ACM MobiHOC, pages 87–96, Aug 2000.

Y. Zhang and W. Lee and Y. Huang. Intrusion detection techniques for mobile wireless networks. In ACM/Kluwer Mobile Networks and Applications (MONET), volume 8, pages 545–556, Sep 2003.

S. Bhargava and D. P. Agrawal. Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In VTC, volume 4, pages 2143–2147, fall 2001.

C. Perkins and E. Royer. Ad-hoc On-Demand Distance Vector Routing. In 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb 1999.

C. Krugel and T. Toth. Flexible, mobile agent based intrsuion detection for dynamic networks. In European Wireless, 2002.

D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad-hoc Wireless Networks, chapter 5, pages 153–181. 1996.

S. Marti et al. , ”Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, ”ACM MOBICOM, 2000.

J. Kong et al. , ”Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks, ”IEEE ICNP, 2001.

K. BAL Krishnan, J. Deng, P. K. Varhney. TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In IEEE WCNC, Mar 2005.

S. Bose and A. Kannan, ”Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks, ”Signal Processing, Communications and Networking, 2008. ICSCN '08. International Conference on 46, pp. 182 – 188, January 2008.

HW. Femg and CL. Liu, ”Design of a Joint Defense System for Mobile Ad Hoc Networks, ”in Proceedings of IEEE VTC 2006Spring, Melbourne, Australia, pp. 742 – 746, May, 2006.

A. Hasswa, M. Zulkernine and H. Hassanein, ”Routeguard:An Intrusion Detection and Response System for Mobile Ad Hoc Networks, ”Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), IEEE International Conference on Volume 3, 2224, pp. 336 – 343, August 2005.

A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis and Y. Yesha, ”Thresholdbased intrusion detection in ad hoc networks and secure AODV, ”Ad Hoc Networks Volume: 6, Issue: 4, pp. 578 – 599, June, 2008

P. Michiardi and R. Molva, Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, ”Communication and Multimedia Security Conference (CMS'02), September 2002

S. Buchegger and J. Le Boudec, Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks), ”Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), pp. 226-336, June 2002.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, ”Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), pp. 255-265, August 2000.

S. Bansal and M. Baker, Observation-Based Cooperation Enforcement in Ad hoc Networks, ”Research Report cs. NI/0307012, Stanford University, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.