Negative Acknowledgement Based Intrusion Detection System for Mobile Ad-hoc Network
Keywords:
Mobile Ad-hoc Network, Attack Types, Intruder, Intruder Detection SystemAbstract
As security perspective, mobile ad-hoc network is much targeting rather than wired networks. Reason behind this is open environment and lack of physical tight proximity property of mobile ad-hoc networks. Therefore offenders get chance to commit crime using the weak surface. Numerous kinds of attacks committed by attackers to influence network functioning and performance. Attacks committed by intruders that are part of network and compromised. In this paper, different activity of intruders observed and evaluates existing intrusion detection approach with proposed one. Proposed approach, detect intruders via third node acknowledge policy. Proposed approach has evaluated with existing techniques in aspect of packet delivery ratio, routing overhead, throughput etc.
References
Pallavi Sharma, Aditya Trivedi, “An Approach to Defend Against Wormhole Attacks in Ad Hoc Network using Digital Signature”. IEEE ISSN 978-1-61284-486-2/2011.
Radhika Saini, Manju Khari, “Defining Malicious Behaviour of a Node and its Defensive Methods in Ad Hoc Network” International Journal of Computer Applications (0975-8887) Volume 20-No.4, April 2011.
Rajbir Kaur, M.S. Gaur, V. Laxmi. “A Novel Attack Model Simulation in DSDV Routing” 978-1-4244-8704-2 IEEE 2011.
E.A. Mary Anita, V. Thulasi Bai, “Defending Against Wormhole Attacks in Multicast Roruting Protocols for Mobile Ad Hoc Networks” 978-1-4577-0787-2/2011 IEEE.
Balakrishnan, K.; Jing Deng; Varshney, V.K., "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE, vol.4, no., pp. 2137-2142 Vol. 4, 13-17 March 2005.
Chiu, H.S.; Wong Lui, “DelPHI: wormhole detection mechanism for ad hoc wireless networks”, The 1st International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 16-18 January 2013.
Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, Carnegie Mellon University.
Srdjan Capkun, Levente Buttyan, Jean-Pierre Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 31, 2003, Washington, USA.
Abdulsalam Basabaaa, Tarek Sheltamia and Elhadi Shakshukib, “Implementation of A3ACKs intrusion detection system under various mobility speeds”, 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.