CFP last date
20 January 2025
Reseach Article

Novel Evaluation of ACK based IDS Techniques for Dropping Attack in MANETs using OMNET++ Simulator

by M. A. Mohamed, H. S. Mostafa, M. E. Eissa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 6
Year of Publication: 2016
Authors: M. A. Mohamed, H. S. Mostafa, M. E. Eissa
10.5120/ijca2016911510

M. A. Mohamed, H. S. Mostafa, M. E. Eissa . Novel Evaluation of ACK based IDS Techniques for Dropping Attack in MANETs using OMNET++ Simulator. International Journal of Computer Applications. 150, 6 ( Sep 2016), 1-8. DOI=10.5120/ijca2016911510

@article{ 10.5120/ijca2016911510,
author = { M. A. Mohamed, H. S. Mostafa, M. E. Eissa },
title = { Novel Evaluation of ACK based IDS Techniques for Dropping Attack in MANETs using OMNET++ Simulator },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 6 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number6/26094-2016911510/ },
doi = { 10.5120/ijca2016911510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:10.314208+05:30
%A M. A. Mohamed
%A H. S. Mostafa
%A M. E. Eissa
%T Novel Evaluation of ACK based IDS Techniques for Dropping Attack in MANETs using OMNET++ Simulator
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 6
%P 1-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networking is becoming one of the most important technologies nowadays, allowing users to get services and access information regardless of their location and allows users to communicate with each other wirelessly without depending on any fixed infrastructure. However, MANET works under an assumption that all nodes in the network are collaborating to forward packets which in fact isn't true as there are selfish nodes which refuse to forward the packets to reserve its energy and other resources, also there are misbehaving nodes (attack nodes) which drop packet to harm the network. So, with the presence of the selfish nodes and dropping attack nodes the sureness of the data packet delivery to the destination is absent, therefore, the importance of an intrusion detection system arises to prevent those kinds of nodes from harming the network and make sure that data packet arrives at the destination node. As the importance of the MANET increases, it became a point of interest to the researchers to secure it, so many schemes like Watchdog and Pathrater; Ex-Watchdog; TWOACK; AACK and A3ACK were introduced to achieve this goal. The reference to all techniques is the watchdog technique but it has six weaknesses which are it fails to detect malicious misbehaviors with the presence of the following: (i) partial dropping; (ii) collusion; (iii) false misbehavior report; (iv) limited transmission power; (v) receiver collisions, and (vi) ambiguous collisions. The ACK based techniques were proven to detect malicious misbehaviors with the presence of collaborative attacks, receiver collisions, and limited transmission power .This paper introduces a study of the ability of the ACK based techniques to overcome a major disability in watchdog technique (using omnet++ simulator) which is used to detect malicious misbehaviors with the presence of partial dropping 50%. The importance of choosing partial dropping comes from simulating a real attack scenario, also it is more difficult for the intrusion detection system to detect attackers with partial dropping so, in some way using a partial dropping attack is an evaluation of the strength of the intrusion detection system technique. From this research, it is proven that the ACK based techniques can actually overcome this disability but only with low speed as with low speed the performance is acceptable but with high speed and the presence of collaborative attacks the ACK based techniques have low performance.

References
  1. Y. Kim, R.G. Evans, and W.M. Iversen, “Remote sensing and control of an irrigation system using a distributed wireless sensor network,” IEEE Transactions on Instrumentation and Measurement, Vol.57, No.7, pp: 1379-1387, 2008.‏
  2. A.R. Kumar, M.K. Abhishek, et al., “A Review on Intrusion Detection Systems in MANET,” International Journal of Engineering Science and Innovative Technology, Vol.2, pp: 609-618, March 2013.
  3. T. Anantvalee and J. Wu, “A survey on intrusion detection in mobile ad hoc networks,” Springer US on Wireless Network Security, pp: 159-180, 2007.‏
  4. S. Marti, T.J. Giuli, K. Lai, M. and Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th annual international conference on Mobile computing and networking, 2000.‏
  5. N. Nasser and Y. Chen, “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks,” IEEE International Conference on Communications, 2007.‏
  6. D. Johnson, Y. Hu, and D. Maltz, “The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4”. No.RFC 4728, 2007.‏
  7. A. Musaddiq and F. Hashim, “Multi-hop wireless network modelling using OMNET++ simulator,” Computer, Communications, and Control Technology (I4CT) International Conference, pp: 559-564, 2015.‏
  8. E.M. Shakshuki, N. Kang, and T.R. Sheltami, “EAACK—a secure intrusion-detection system for MANETs,” IEEE Transactions on Industrial Electronics, Vol.60, No.3, pp: 1089-1098, 2013. ‏
  9. K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: preventing selfishness in mobile ad hoc networks,” Wireless communications and networking conference, Vol.4, pp: 2137-2142, 2005.
  10. A. Al-Roubaiey, T. Sheltami, A. Mahmoud, E. Shakshuki, and H. Mouftah, “AACK: adaptive acknowledgment intrusion detection for MANET with node detection enhancement,” 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.‏
  11. A. Basabaa, T. Sheltami, and E. Shakshuki, “Implementation of A3ACKs intrusion detection system under various mobility speeds,” Procedia Computer Science, Vol.32, pp: 571-578, 2014.‏
  12. A. Varga and R. Hornig, “An overview of the OMNeT++ simulation environment,” Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008.‏
  13. J. Broch, D.A. Maltz, D.B. Johnson, Y.C. Hu, and J. Jetcheva, ‘‘A performance comparison of multi-hop wireless ad hoc network routing protocols,” In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pp: 85-97, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network (MANETS) Ack-based Intrusion Detection System Dropping attack Partial dropping OMNET++