Intrusion detection system on MAC layer for attack prevention in MANET

Modern communication is containing different types of wireless networks as backbone for various applications used for different users. Mobile Ad-hoc Networks is the type of network which contains many mobile devices and provide good solution for many type communications for different applications military, industry and remote areas (flood hit areas, nuclear hit areas etc). Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred in Ad-hoc network. These attacks are very common in case of Reactive Protocols like Ad-hoc On Demand Distance Vector Protocol. In this research, an intrusion detection system will be developed for detection and isolation of attacks. In this Research, mac layer applications will be used for detecting malicious activities and will focus on the finding of attack sequences in the Network. This Research provided an intrusion detection system on MAC layer which have detected the attack sequences in MANET network. Research provides stable and effective attack observations which can be directly applicable to the Real environment for Mobile Ad-hoc Devices

[1]  Tapan P. Gondaliya,et al.  Enhance IDS False Alarm Filtering Using KNN Classifier , 2013 .

[2]  E. A. Mary Anita,et al.  Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[3]  Maninder Singh,et al.  Intrusion detection System for Attack Prevention in Mobile Ad-hoc Network , 2013 .

[4]  Kunwar Pal,et al.  IMPLEMENTATION OF DECISION TREE ALGORITHM AFTER CLUSTERING THROUGH WEKA , 2013 .

[6]  Vineet Srivastava,et al.  Wormhole Attack Detection in Mobile Ad Hoc Networks , 2012 .

[7]  Turgay Korkmaz Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[8]  Ma Hongwei The study on ad hoc networks security strategy based on Routing Protocols , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[9]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[10]  Udo W. Pooch,et al.  Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.

[11]  M. Ravichandran,et al.  Detecting Sinking Behavior at MAC and Network Layer Using SVM in Wireless Ad hoc Networks , 2012 .

[12]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[13]  Liu Fagui,et al.  Research & implementation of uCLinux-based embedded browser , 2007 .