The study of Intrusion Detection Techniques for Cooperation of Node

Since there is no infrastructure in mobile ad hoc n etworks, each node must rely on other nodes for coo peration in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packe ts but actually drop or modify them because they are misbe having. The simulations in show that only a few mis behaving nodes can degrade the performance of the entire sys tem. There are several proposed techniques and prot ocols to detect such misbehavior in order t o avoid those nodes, and some schemes also propose punishment as well. It is very difficult to design once- for strategy may be more feasible. A secure protocol sh ould at least include addition, it should provide a scheme to easily add new security features in the future. Due to the imp ortance of MANET routing protocols, we focus on the detection of attacks targeted at MANET routing protocols Thi WatchDog and Pathrater approach. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A path rater then hel ps to find the routes that do not contain those nod es. In DSR, the routing information is defi message through intermediate nodes until it reaches the destination.

[1]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[2]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[3]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[4]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[6]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[7]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[8]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[9]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[10]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[15]  Kavitha Kumar Intrusion detection in mobile adhoc networks , 2009 .

[16]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).