CFP last date
20 December 2024
Reseach Article

DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET

by Sarika Patil, Bharat Tidke
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 4
Year of Publication: 2014
Authors: Sarika Patil, Bharat Tidke
10.5120/18193-9107

Sarika Patil, Bharat Tidke . DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET. International Journal of Computer Applications. 104, 4 ( October 2014), 39-44. DOI=10.5120/18193-9107

@article{ 10.5120/18193-9107,
author = { Sarika Patil, Bharat Tidke },
title = { DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 4 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number4/18193-9107/ },
doi = { 10.5120/18193-9107 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:18.999316+05:30
%A Sarika Patil
%A Bharat Tidke
%T DH-EAACK Secure Intrusion Detection System to detect Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 4
%P 39-44
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-Hoc Networks (MANETs) type of Ad-hoc wireless network. Due to mobility of nodes, MANET more vulnerable to different types of attacks and security threats. To overcome these challenges Intrusion Detection System technique used. By using the schemes of EAACK, this paper proposed dynamic hierarchical intrusion detection architecture that addresses these challenges while finding specific and conventional attacks in MANET. The proposed structural design organized as a dynamic hierarchy. Dynamic hierarchy in which hierarchy organized as group of clusters, cluster heads are selected based on topology and other criteria. Routes are initialized by using AODV routing protocol. The usefulness of the architecture demonstrated via black hole attack scenarios in which attack is detected and removed. In this paper we propose Dynamic Hierarchical Enhanced Adaptive Acknowledgement (DH-EAACK) architecture which has better performance in terms of packet delivery ratio and throughput due to cluster based IDS. Comparing results of existing systems with proposed system when there are 30% malicious nodes in the network PDR is 0. 9% better than existing techniques. End to end delay, routing overhead has less performance compared with existing due to black hole nodes in the network. Future work can be extended by using election algorithms to elect cluster head and provide more security by using hybrid (AES and MD5) cryptographic algorithm.

References
  1. Y. Kim, "Remote sensing and control of an irrigation system using a distributed wireless sensor network," IEEE Trans. Instrumentation, vol. 57, no. 7, pp. 1379–1387, Jul. 2008.
  2. N. Nasser and Y. Chen, "Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network," in Proc. IEEE Int. Conf. Commun. , Glasgow, Scotland, pp. 1154–1159, Jun. 24–28, 2007.
  3. M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM Workshop Wireless Secure , 2002, pp. 1–10.
  4. Jayakumar and G. Gopinath, Ad hoc mobile wireless networks routing protocolA review,J. Comput. Sci. , vol. 3, no. 8, pp 574582, 2007.
  5. S. Sreepathi, V. Venigalla, and A. Lal, A Survey Paper on Security Issues Pertaining to Ad-Hoc Networks. www4. ncsu. edu/ sssreepa/Adhoc-networks-Security-Survey. doc.
  6. S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proceedings of the 6th Annual International Conference , August 2000.
  7. Elhadi M. Shakshuki, Nan Kang,et. al EAACK ASecure Intrusion Detection System for MANETS IEEE Transaction on Industrial Electronics, vol. 60, no. 3, Mar 2013.
  8. BhavyeshDivecha, Ajith Abrahame,et. al "Analysis of Dynamic Source Routing and Destination Sequenced Distance-Vector Protocols for Different Mobility models", First Asia International Conference on Modeling and Simulation, AMS2007. March, 27-30, 2007, Phuket, Thailand. Publisher: IEEE Press, pp. 224-229.
  9. C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," in Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on. IEEE, 1999, pp. 90–100.
  10. D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks," in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
  11. K. Makki, N. Pissinou, and H. Huang, "Solutions to the black hole problem in mobile ad-hoc network," 5th World Wireless Congress, pp. 508–512, 2004.
  12. M. -C. Basile, M. -Z. Kalbarczyk, and F. -R. K. Iyer, "Inner-circle consistency for wireless ad-hoc networks," IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp. 39–55, 2007.
  13. Q. He, D. Wu, and P. Khosla, "Sori: A secure and objective reputationbased incentive scheme for ad-hoc networks," Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, vol. 2, pp. 825–830, 21-25 March 2004.
  14. D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. -Y. Tseng, and T. Bowen, "A general cooperative intrusion detection architecture for manets," in Proceedings of the Third IEEE International Workshop on Information Assurance, March 2005, pp. 57–70.
  15. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U. K. : Cambridge Univ. Press, Aug. 2007.
  16. Y. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," in Proc. ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03), October 2003, pp. 135-147.
  17. Bansal and Baker, Kejun Liu, Jing Deng, Pramod K. Varshney, Kashyap Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs ",IEEE transactions on Mobile Computing ,P448-502, vol. 6, NO. 5, May 2007.
  18. Balakrishnan, K. ; Jing Deng; Varshney, V. K. , 2005 "TWOACK: preventing selfishness in mobile ad hoc networks", In Proceedings of Wireless Communications and Networking Conference, 2005 IEEE , vol. 4, no. , pp. 2137-2142(March 2005).
  19. T. Sheltami, Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence of misbehaving nodes in MANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009.
  20. M. Umaparvathi, Dharmishtan K. Varughese,"Two Tier Secure AODV against Black Hole Attack in MANETs" European Journal ofScientific Research, ISSN 1450-216X Vol. 72 No. 3(2012),pp,369-382.
  21. R. Murugan, A. Shanmugam "Cluster Based Node Misbehavior Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks" International Journal of Computer Science and Security ISSN1985-1553 volume :6;Issue:3;Start page:188;Date:2012.
  22. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1983.
  23. Nat. Inst. Std. Technol. , Digital Signature Standard (DSS) Federal Information Processing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS).
  24. J. Chen and J. Wu. A Survey on Cryptography Applied to Secure Mobile Ad Hoc Networks and Wireless Sensor Networks. In Wireless/Mobile Network Security. Springer,2008.
  25. M. Abolhasan, T. Wysocki, and E. Dutkiewicz. "A review of routing protocols for mobile ad hoc networks. Ad hoc networks, "2(1):122, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc On demand Routing Protocol Attacks Digital Signature Intrusion Detection System (IDS) Mobile Ad-hoc Network Security.