A Novel Acknowledgement Based Intrusion Detection System For Manets
A Novel Acknowledgement Based Intrusion Detection System For Manets
A Novel Acknowledgement Based Intrusion Detection System For Manets
OPEN
Journal
ACCESS
I. INTRODUCTION
Mobile Adhoc Networks (MANETs) is collection of wireless mobile nodes that are free to move in any
directions at any speed. Mobile hosts are equipped with the wireless transmitter and a receiver that
communicate directly with each other or forward message through other nodes. One of the major advantages of
the mobile networks is to allow different nodes for data communications and still maintain their mobility.
However, this communication is limited to the range of different transmitters. It means that two hosts cannot
communicate with each other when the distance between the two hosts is beyond the communication range of
their own. MANET solves this problem by allowing intermediate hosts to relay data transmissions. This is
achieved by dividing MANET into two types of networks such as single-hop and multihop[1]. In a single-hop
network, all the nodes within the same radio range communicate directly with each other. But in a multihop
network, the nodes rely on other intermediate nodes to transmit if the end point node is out of their radio
communication range [2].
www.ijmer.com
www.ijmer.com
www.ijmer.com
www.ijmer.com
IV. CONCLUSION
MANET is a collection of wireless mobile nodes forming a network without the need of existing
infrastructure. There are various challenges that are faced in the MANET environment. These are mostly due
to the lack of the resources of these networks. They are usually set up in situations of emergency, for temporary
operations or in a case if there are no resources to set up elaborate networks. The solutions for traditional
networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of network
communication and lack of any security infrastructure raise several security problems. This paper focuses on
the acknowledgment based IDS for MANETs. The proposed method provides higher malicious- behaviordetection rates in certain circumstances while does not greatly affect the network performances.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An acknowledgment-based approach for the detection of
routing misbehaviour in MANETs, IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536550, May 2007.
EAACK A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan
Kang and Tarek R. Sheltami, Member, IEEE
R. Akbani, T. Korkmaz, and G. V. S. Raju, Mobile Ad hoc Network Security, in Lecture Notes in Electrical
Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659666.
Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes
Marjan Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and
Technology 44 2008.
D. Johnson and D. Maltz, Dynamic Source Routing in ad hoc wireless networks, in Mobile Computing. Norwell,
MA: Kluwer, 1996, ch. 5, pp. 153181.
J.-S. Lee, A Petri net design of command filters for semiautonomous mobile sensor networks, IEEE Trans. Ind.
Electron., vol. 55, no. 4, pp. 18351841, Apr. 2008.
A. Patcha and A. Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc
networks, in Proc. Radio Wireless Conf., 2003, pp. 7578.
B. Sun, Intrusion detection in mobile ad hoc networks, Ph.D. dissertation, Texas A&M Univ., College Station,
TX, 2004.
N. Kang, E. Shakshuki, and T. Sheltami, Detecting misbehaving nodes in MANETs, in Proc. 12th Int. Conf.
iiWAS, Paris, France, Nov. 810, 2010, pp. 216222
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, Secure routing and intrusion detection in ad hoc
networks, in Proc. 3rd Int. Conf. Pervasive Comput. Commun, 2005, pp. 191199.
www.ijmer.com