CFP last date
20 January 2025
Reseach Article

Intrusion Detection System of Mobile Ad Hoc network based on Extension Techniques of Watchdog

Published on November 2014 by G.girija, M.g.sumithra, G.brindha, Gowdhami.n
International Conference on Innovations in Information, Embedded and Communication Systems
Foundation of Computer Science USA
ICIIECS - Number 1
November 2014
Authors: G.girija, M.g.sumithra, G.brindha, Gowdhami.n
6a5cc13a-c0ae-4344-9e41-4d8525cc5884

G.girija, M.g.sumithra, G.brindha, Gowdhami.n . Intrusion Detection System of Mobile Ad Hoc network based on Extension Techniques of Watchdog. International Conference on Innovations in Information, Embedded and Communication Systems. ICIIECS, 1 (November 2014), 24-27.

@article{
author = { G.girija, M.g.sumithra, G.brindha, Gowdhami.n },
title = { Intrusion Detection System of Mobile Ad Hoc network based on Extension Techniques of Watchdog },
journal = { International Conference on Innovations in Information, Embedded and Communication Systems },
issue_date = { November 2014 },
volume = { ICIIECS },
number = { 1 },
month = { November },
year = { 2014 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /proceedings/iciiecs/number1/18650-1436/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Information, Embedded and Communication Systems
%A G.girija
%A M.g.sumithra
%A G.brindha
%A Gowdhami.n
%T Intrusion Detection System of Mobile Ad Hoc network based on Extension Techniques of Watchdog
%J International Conference on Innovations in Information, Embedded and Communication Systems
%@ 0975-8887
%V ICIIECS
%N 1
%P 24-27
%D 2014
%I International Journal of Computer Applications
Abstract

Mobile Ad-hoc network is widely used as emerging technology in many applications. It is also vulnerable to various network layer attacks, because of its network architecture and its routing protocol. Watchdog is the widely used intrusion detection system. Recently, several schemes have been introduced to overcome the limitations of watchdog which results in additional packet overhead in the network. The proposed scheme is based on clustering approach and it effectively detects the shortcomings of watchdog namely limited transmission range, receiver collision, false misbehavior report and collusion problem. About 37% decrease in the end to end delay is achieved when proposed method is used in the network. The security level of the network is further enhanced by the use of Diffie-Hellman key agreement algorithm.

References
  1. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, "EAACK—A Secure Intrusion-Detection System for MANETs", IEEE transactions on industrial electronics, vol. 60, no. 3, March 2013
  2. Anoosha Prathapani • Lakshmi Santhanam • Dharma P. Agrawal "Detection of blackhole attack in aWireless Mesh Network using intelligent honeypot agents", in springer 2013
  3. Gunhee Lee , Wonil Kim, Kangseok Kim, Sangyoon Oh and Dong-kyoo Kim, "An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks", in springer 2013
  4. Adnan Nadeem and Michael P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", in the proceedings of IEEE communications surveys & tutorials, March 2013
  5. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes in MANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009
  6. Anantvalee T and Wu J "A Survey on Intrusion Detection in Mobile Ad Hoc Hoc Networks," in Wireless/Mobile Security. New York: Springer-Verlag, 2008
  7. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5,pp. 536–550, May 2007.
  8. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehaviour in mobile ad hoc networks" in Proc. 6th Annu. Int. Conf. Mobile Comput, Netw Boston, MA, 2000, pp. 255–265.
  9. R. Rivest, A. Shamir, and L. Adleman "A method for obtaining digital signatures and public-key cryptosystems" Commun, ACM, vol. 21, no. 2, pp. 120–126, Feb. 1999.
  10. Olivier Chevassut, Emmanuel Bresson and David Pointcheval, "On intrusion detection and response for mobile ad hoc networks," in Proceedings of IEEE International Conference on Computing, Communication. , 2004, pp. 747–752.
  11. Hu Y, Perrig A, and Johnson D, Packet Leashes "A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", in Proceedings of IEEE INFOCOM, 2002.
  12. Mamatha G. S and Sharma S. C, "Network Layer Attacks and Defense Mechanisms in MANETS- A Survey", International Journal of Computer Applications, vol. 9– No. 9, November 2010
  13. Srinivasan T, Mahadevan V, Meyyappan A, Manikandan A, Nivedita and M,Pavithra N, "Hybrid Agents for Power Aware Intrusion Detection in Highly Mobile Ad-hoc networks", proceedings of International Conference on Systems and Network Communication (ICSNC'06) October 2006.
  14. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Ariadne - A secure On-Demand routing protocol for Ad hoc networks"; Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 12-23, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Intrusion Detection System Network Layer Attacks Watchdog Diffie-hellman Key Agreement Algorithm.