Abstract

INTRUSION DETECTION IN MOBILE AD-HOC NETWORK

ARCHANA SINGH, DR. RAJESH PATHAK, DR.S.P. TRIPATHI

123-128

Vol: 1, Issue: 4, 2011

A mobile Ad-hoc network (Mobile Ad-Hoc Network) is a self-created self-organized and self administering set of nodes connected via wireless links without the aid of any fixed infrastructure or centralized administrator. Security has become important to mobile ad hoc networks (Mobile Ad-Hoc Network). Due to its unique features such as limited power and limited bandwidth, open nature, lack of infrastructure and central management, node mobility and change of dynamic topology. It is mainly use for many intelligent missions and life-critical applications. However, the broadcast nature of inter-node communications and node mobility in Mobile Ad-Hoc Network make it very challenging to secure. Moreover, their constantly changing topology causes network node density and neighbor relationships to change dynamically. The prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. The Intrusion Detection Systems utilizes are: (i) both anomaly and misuse detection schemes to identify attacks in Mobile Ad-Hoc Network and (ii) mobile agents (MAs) to augment each node’s intrusion-detection capability. In particular, each node is equipped with local IDS, and MAs will be dispatched periodically or on- demand to augment each node’s IDS. We present the design of these IDS and the overall network structure, as well as the methods for authenticating and dispatching MAs. This paper presents an intrusion detection system (IDS) for Mobile Ad-Hoc Network

Download PDF

    References

  1. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, “An Acknowledgment-Based Approach for the Detection of Routing Misbehaviour in Mobile Ad-Hoc Network”, IEEE Transactions on mobile computing, Vol. 6, NO. 5, May 2007.
  2. Dhanalakshmi, Dr.M.Rajaram ,” A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”,IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, Oct,2008.
  3. Zan Kai Chong1, Moh Lim Sim1, Hong Tat Ewe2, and Su Wei Tan ,” Separation of Detection Authorities (SDA) Approach for Misbehavior Detection in Wireless Ad Hoc Network”,PIERS ONLINE, VOL. 4, NO. 8, 2008.
  4. Ayyaswamy Kathirvel, Rengaramanujam Srinivasan, “A System of Umpires for Security of Wireless Mobile Ad Hoc Network”, In (International Arab Journal of e-Technology, Vol. 1, No. 4, June 2010) Faculty of Computer Science and Engineering, B.S.Abdur Rahman University, India
  5. W. Jansen, P. Mell, T. Karygiannis, and D. Marks, “Applying Mobile Agents to Intrusion Detection and Response,” in NIST Interim Report (IR) 6416, October 1999.
  6. T. Park and K. G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 4, no. 3, pp. 297–309, May/June 2005
  7. A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, “SWATT: SoftWarebased ATTestationfor Embedded Devices,” in Proceedings of the IEEE Symposium on Security and Privacy, May 2004
  8. S.Madhavi and Dr. Tai Hoon Kim “An Intrusion Detection System in Mobile Ad hocNetworks” International Journal of Security and its Application, 2, No 3, July 2008.
  9. T. Sander and C. F. Tschudin, “Towards Mobile Cryptography,” in Proceedings of the IEEE Symposium on Security and Privacy, May 1998
  10. P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks,” in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.
  11. S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, Pp. 255-265, 2000
  12. S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks” March 2009, WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.