Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks

MANET has been a hot research topic for quite a few years. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. Applications for MANET range from military operations and emergency disaster relief, to community networking and interaction between attendees at a meeting. The challenge of MANETs is to design dequate security schemes for these innovative networks. A challenging MANET security problem is the issue of the presence of malicious nodes; and these malicious nodes can disrupt the network traffic, choke the bandwidth, cause network congestion and consume unnecessary resources like the limited CPU processing capacity, memory and battery power of individual nodes by making byzantine type attacks. In this paper, we propose a comprehensive security scheme by which these malicious nodes can be easily detected. Here, we use our statistical mechanism that uses the statistics of the activities of the nodes and use a decentralized approach to detect these kinds of malicious nodes. Here, we also simulate our decentralized statistical analysis based intrusion detection scheme over routing protocol for detecting malicious node(s) and analyze the performance and efficiency of our algorithm over previous routing protocol.

[1]  Shweta Bhandare Scriptor Energy Aware Implementation of an Ad Hoc Routing Protocol , 2003 .

[2]  Mehdi Dehghan,et al.  Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks , 2005, WEC.

[3]  Hung Keng Pung,et al.  Enhancement of passive cluster based routing protocol for mobile adhoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[4]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[5]  Carsten Griwodz,et al.  Towards middleware services for mobile ad-hoc network applications , 2003, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings..

[6]  Xiaoyan Hong,et al.  Scalable routing protocols for mobile ad hoc networks , 2002, IEEE Netw..

[7]  J. Kaiser,et al.  Survey of mobile ad hoc network routing protocols , 2005 .

[8]  Xue Liu,et al.  A survey of multicast routing protocols for mobile Ad-Hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[9]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .