CFP last date
20 January 2025
Reseach Article

Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs

by D.Srinivasa Rao, T. Pandurang Vital, T.V.S. Sriram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 4
Year of Publication: 2011
Authors: D.Srinivasa Rao, T. Pandurang Vital, T.V.S. Sriram
10.5120/3089-4236

D.Srinivasa Rao, T. Pandurang Vital, T.V.S. Sriram . Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs. International Journal of Computer Applications. 26, 4 ( July 2011), 36-40. DOI=10.5120/3089-4236

@article{ 10.5120/3089-4236,
author = { D.Srinivasa Rao, T. Pandurang Vital, T.V.S. Sriram },
title = { Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 4 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number4/3089-4236/ },
doi = { 10.5120/3089-4236 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:58.688364+05:30
%A D.Srinivasa Rao
%A T. Pandurang Vital
%A T.V.S. Sriram
%T Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 4
%P 36-40
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, the security issues on MANET have become one of the primary concerns. MANETs rely on the cooperation of the nodes participating in the network to forward packets for each other. Therefore, MANET routing protocols are more vulnerable than routing protocols in wired networks. Because of unique features of MANETs, existing security mechanisms, especially Intrusion Detection Systems (IDSs) like authentication and encryption that proposed for wired networks are not suitable for this type of networks. Hence, in this paper, we have proposed a new IDS architecture based on agents and clusters. It detects intermediate nodes misbehaving and anomalies in packet forwarding. Simulation results show that our architecture can achieve low false positive and high detection ratio.

References
  1. B. Sun, K. Wu, and U. Pooch, “Routing Anomaly Detection in Mobile Ad Hoc Networks,” Proc. of the 12thInternational Conference on Computer Communications and Networks (ICCCN’03), Dallas, TX, Oct. 20-22, 2003.
  2. A. Mishra, K. Nadkarni, and A. Patcha” Intrusion Detection in Wirelessad Hoc Networks” IEEE Wireless Communications, 2004, pp. 48–60.
  3. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-hoc Networks,” Proc.of the MOBICOM 2000, 2000, pp. 275–283.
  4. Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” Wireless Networks, vol. 9, 2003, pp 45-556.
  5. O. Kachirski, and R. Guha, “Intrusion Detection Using Mobile Agents in Wireless Ad hoc Networks,” Proc. of the IEEE Workshop on Knowledge Media Networking, July 2002, pp.153-158.
  6. P. Albers, O. Camp, et al. “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proc. of the 1st InternationalWorkshop on Wireless Information Systems (WIS-2002), April 2002, pp. 1-12.
  7. B. Sun, K.Wu, and U. W. Pooch, ”Alert Aggregation in Mobile Ad Hoc Networks,” Proc. of the ACM Workshop on Wireless Security (WiSe'03) in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), 2003, pp. 69-78.
  8. T. Li, M. Song, and M. Alam, “Compromized Sensor Node Detection: A Quantitative Approach,” Proc. of the IEEE International Conference on Distributed Computing Systems, 2008, pp. 352–357.
  9. S. R. Das, C. E. Perkins, and E. M. Royer,” Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks,” Mobile Ad Hoc Networking Working Group, Internet Draft, February 2001.
  10. E. Çayırcı and C. Rong, “Routing in Ad Hoc, Sensor and Mesh Networks”, in Book Security in Wireless Ad Hoc and Sensor Networks (chapter 5), CRC Press LLC, 2009.
  11. K. Kumar, “Intrusion Detection in Mobile Adhoc Networks,” Master's Thesis, University of Toledo, December 2009.
  12. GloMoSim: Global Mobile Information Systems Simulation Library, http://pcl.cs.ucla.edu/projects/glomosim/.
  13. C. Hongsong, F. Zhongchuan, W. Chengyao, J. Zhenzhou, and H. Mingzeng, “Using Network Processor to Establish Security Agent for AODV Routing Protocol,” Journal of Computing and Information Technology - CIT 15, 2007, pp. 61–70.
  14. F. Anjum and P. Mouchtaris, Security for Wireless Ad Hoc Networks (Chapter 1), CRC Press LLC, 2007.
  15. E. Çayırcı and C. Rong, ”Security Attacks in Ad Hoc, Sensor and Mesh Networks,” Security in Wireless Ad Hoc and Sensor Networks (Chapter8), CRC Press LLC, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Anomaly Detection Intrusion Detection System (IDS) misbehaving nodes Mobile Ad hoc Networks (MANETs)