Tania infrastructure. As it has been mentioned;

Tania kanwal                                                                 Sadiya shamsher2014-BCS-047                                                              2014-BCS-040 [email protected]                               [email protected] Intrusion Detection In Wireless Ad HocNetwork AbstractInrecent years, the use of mobile ad hoc networks (MANETs) has been widespread inmany applications. The migration towireless network from wired network has been a global trend in the past fewdecades.

The mobility brought by wireless network made it possible in manyapplications .Among all wireless networks, MANETs is one of the most importantand unique applications. Like other networks, it does not require a staticnetwork infrastructure. As it has been mentioned; that it doesn’t requireproper infrastructure that results in threats to security. The open medium andwide distribution of nodes make MANET vulnerable to malicious attackers.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Therefore,it is important to develop efficient intrusion detection mechanisms to protectMANET from attacks.Keywords- MANET; Intrusion Detection System;Digital Signature; Malicious nodes; Misbehaviour report;1. Introduction      Awireless ad-hoc network consists of a collection of mobile nodes thatcommunicate with each other via wireless links without a fixed communicationinfrastructure.

Nodes within each other’s radio range communicate directlythrough wireless links, while those that are far apart rely on intermediatenodes to forward their messages. Each node has a dual function; it works as arouter as well as a host. Unlike other networks MANETs does not depend on afixed infrastructure. Instead, hosts rely on each other to keep the networkconnected. One of the main applications of Manets is the military tactical andother security-sensitive operations. They are also being used for commercialpurposes due their unique features. One main challenge in design of thesenetworks is their liability to security attacks.

The main  goal is to investigate the development of someprotocols and algorithm that enables to securely collaborate over mobile ad hocnetworks as well as the wired backbone. 2.Intrusion Detection Intrusion detection can be defined as aprocess of monitoring activities in a system, which can be a computer ornetwork system. The mechanism by which this is achieved is called an intrusiondetection system (IDS). An IDS collects activity information and then analyzesit to determine whether there are any activities that violate the securityrules. Once an IDS determines that an unusual activity or an activity that isknown to be an attack occurs, it then generates an alarm to alert the securityadministrator.

In addition, IDS can also initiate a proper response to themalicious activity1. Although there are several intrusion detectiontechniques developed for wired networks today, they are not suitable forwireless networks due to the differences in their characteristics. Therefore,those techniques must be modified or new techniques must be developed to make intrusiondetection work effectively in MANETs.  3.Types of Attacks In ManetsThebehaviour and performance of MANET can be affected by different types ofattacks.

Attacks can be classified on the basis of its domain, protocols andmeans of attack. The attacks can be classified into two types namely, outsiderand insider attacks, according to the domain of the attacks. Insider attacksare carried out by the compromised nodes, which are actually part of the network.Outsider attacks are carried out by the nodes which do not belong to thenetwork.

Insider attacks are more severe than outsider attacks because insidersknown secret information in the network and have privileged access rights.Theattacks can also classify into two major categories: active and passive attacksaccording to the attack means. Passive attacks obtain the data exchanged in thenetwork without disrupting the operation, while an active attack involvesinterrupting the information, modification, thereby disrupting the normalfunctionality of MANET. 4.Literature review 4.1EAACK-A Secure Intrusion Detection System for MANET MANET does not need afixed network infrastructure; every single node works as both a transmitter anda receiver. Nodes communicate directly with each other when they are bothwithin the same communication range 2.

Otherwise, they rely on theirneighbours to relay messages. The self-configuring ability of nodes in MANETmade it popular among critical mission applications like military use oremergency recovery. The open medium and wide distribution of nodes make MANETopen to malicious attackers. For this reason, it is important to developefficient intrusion-detection mechanisms to protect MANET from attacks. Thispaper proposes a new system called ( EAACK-Enhanced Adaptive Acknowledgement)is specially designed for MANETs to detect the attackers.

it is anacknowledgement based scheme. EAACK is an acknowledgment-based IDS. This schemeuses digital signature. It requires all acknowledgment packets to be digitallysigned.

This new system requires acknowledgement for the every packet sent tothe receiver with the signature.First after sendingpackets to the receiver it waits for the acknowledgement. Within the predefinedtime interval the source received the acknowledgement from receiver then thepacket transmission is successful.

Otherwise the source node will switch to thesecure acknowledgement mode. In secure acknowledgement mode everyconsecutive three nodes work together to detect the misbehaving nodes in theroute. Every third node in the group needs to give acknowledgement to the firstnode. If any node fails to send acknowledgement is marked as malicious node.Then the source node switches to misbehaviour report authentication (MRA) mode.In MRA mode, source node first searches its local knowledge base for thealternative path to the destination 3. Upon receiving MRA packet, destinationnode will searches for any received MRA is stored; if it stored then ignore thenew packet and the node which sends that packet marked as malicious.

Otherwisethe nodes marked as malicious in the packet are removed from the route infuture transmission. This system uses the digital signatures to authenticatethe acknowledgement packets. Digital signatures prevent the acknowledgementpackets to be forged.

The sender of the acknowledgement packet must sign the packetand after the reception of the packet receiver will verify the authenticity ofthe packet. This new system reduces the packet dropping attack; it is the majorsecurity threat.3 4.

2 Routing Misbehavior in Mobile Ad hoc NetworksMost of the routingprotocols in mobile ad hoc networks have limitations in transmission. So thenodes in MANET assume that other nodes always cooperate with each other torelay packets. This gives opportunities to attackers to achieve the significantimpact on the network with one or two compromised nodes. To solve this problemintrusion detection system should added enhanced security level4. This paperproposed an intrusion detection system called watchdog.

It aims to improve thenetwork throughput with the presence of malicious nodes. Watchdog consists oftwo parts namely, watchdog and pathrater. It is responsible to detect themalicious nodes misbehaviors in the network. Watchdog system has a failurecounter; it is increased while the next node fails to forward the packet.

  Watchdog:Watchdog serves as IDS forMANETs. It is responsible for detecting malicious node misbehaviours in thenetwork by overhearing the next node’s transmission.  Figure 1 detection ofmalicious nodeIt is capable of detectingmisbehaving nodes rather than links. It detects malicious misbehaviours bypromiscuously listening to its next hop’s transmission.

Figure 2 failurecounterIf a Watchdog node overhears thatits next node fails to forward the packet within a certain period of time, itincreases its failure counter. Whenever a node’s failure counter exceeds apredefined threshold, the Watchdognode reports it as misbehaving. Pathrater:Pathrateris used here as response system. It uses the feedback given by the watchdogpart about the malicious misbehaviours of the node.

It cooperates with routingprotocol to avoid the reported malicious nodes in future transmission. Manyimplementation shows that watchdog scheme is efficient. It is capable ofdetecting misbehaving nodes rather than links4. 5. CONCLUSIONThispaper includes literature survey for detecting the malicious nodes misbehaviorsin mobile ad hoc network (MANET).

This paper shows the overview of variousintrusion detection systems to detect the malicious nodes and analyze theattacks in the network and provide security against those attacks in order to provideefficient packet transmission without modification, dropping and partialdropping of packets using an efficient intrusion detection system.


I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out