AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement

被引:12
|
作者
Al-Roubaiey, A. [1 ]
Sheltami, T. [1 ,3 ]
Mahmoud, A. [1 ]
Shakshuki, E. [2 ]
Mouftah, H. [3 ]
机构
[1] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran, Saudi Arabia
[2] Acadia Univ, Jodrey Sch Comp Sci, Wolfville, NS B4P 2R6, Canada
[3] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON K1N 6N5, Canada
关键词
MANET; IDS; Watchdog; TWOACK; AACK; Misbehaving; packet dropping; DSR;
D O I
10.1109/AINA.2010.136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Mobile Ad-hoc NETwork (MANET) is an infrastructureless network consisting of self-configuring mobile nodes connected by wireless links. Nodes rely on each other to store and forward packets. Most of the proposed MANET protocols assume cooperative and friendly network context, and do not address security issues. Furthermore, MANETs are highly vulnerable for passive and active attacks because of their open medium, rapidly changing topology, lack of centralized monitoring. Encryption and authentication solutions, which are considered as the first line of defense, are not sufficient to protect MANETs from packet dropping attacks. Most of the current Intrusion Detection Systems (IDSs) for MANETS rely on the Watchdog technique. In this research we study the behavior of this technique and propose a novel mechanism, named: Adaptive ACKnowledgment (AACK), for solving two significant problems: the limited transmission power and receiver collision. This mechanism is an enhancement to the TWOACK scheme where its detection overhead is reduced while the detection efficiency is increased. NS2 is used to simulate and evaluate the proposed scheme and compare it against the TWOACK and Watchdog methods. The obtained results show that the new AACK scheme outperforms both of the TWOACK and Watchdog methods in terms of network packet delivery ratio and routing overhead.
引用
收藏
页码:634 / 640
页数:7
相关论文
共 50 条
  • [1] A Context Adaptive Intrusion Detection System for MANET
    Cheng, Bo-Chao
    Tseng, Ryh-Yuh
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 310 - 318
  • [2] Intrusion Detection Algorithm for MANET
    Srinivasan, S.
    Alampalayam, S. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2011, 5 (03) : 36 - 49
  • [3] Malicious node identification using quantitative intrusion detection techniques in MANET
    M. Arul Selvan
    S. Selvakumar
    Cluster Computing, 2019, 22 : 7069 - 7077
  • [4] TRUST NODE VALUATION and PATH RELIABILITY TECHNIQUE for INTRUSION DETECTION in MANET
    Naveen, N.
    Annalakshmi, A.
    Valluvan, K. R.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [5] Intrusion Detection System for MANET
    Zalte, S. S.
    Ghorpade, V. R.
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [6] A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System
    Tamilarasan, S.
    Aramudan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 258 - 264
  • [7] Malicious node identification using quantitative intrusion detection techniques in MANET
    Selvan, M. Arul
    Selvakumar, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7069 - S7077
  • [8] A Packet Classification and Node-Level Certification Mechanism for Intrusion Detection in MANET
    Manikandan, S. P.
    Manimegalai, R.
    Rakesh, V.
    Vaishnavi, V.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 647 - +
  • [9] Intrusion Detection Systems in MANET: A Review
    Amiri, Ehsan
    Keshavarz, Hassan
    Heidari, Hossein
    Mohamadi, Esmaeil
    Moradzadeh, Hossein
    2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 453 - 459
  • [10] Smart Intrusion Detection System for MANET
    Kashyap, Neeti
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 174 - 177