Implementation of A3ACKs Intrusion Detection System under Various Mobility Speeds

Abstract Wireless networking is an emerging technology that allows users to access information and services anywhere regardless of their geographic location. Mobile Ad hoc Network (MANETs) is one of the most significant technologies among various wireless communication technologies. In MANETs, all nodes are mobile and can be connected dynamically using wireless link in a random manner. All nodes work as routers and take part in discovery and maintenance of routes to other nodes in the network. MANETs are unique infrastructure less network and have self-configuring features make them suitable for many critical applications, such as military and emergency applications. However, these features make them also vulnerable for all types of passive and active attacks because of open environment, the rapidly changing topology and the decentralization of nodes. In addition, most of the proposed protocols assume that all nodes in the network are cooperative, and do not address security issues. Moreover, most of the proposed existing intrusion detection systems (IDSs) of are based on Watchdog technique. In this paper, we propose and implement a new intrusion detection system named Adaptive three ACKnowledgments (A3ACKs) that solves three significant problems of Watchdog technique, mainly: receiver collision, limited transmission power and collaborative attacks. We use Network Simulator 2 (NS2) to implement and test our proposed system under different networks with various mobility speeds as well as compare our results with the results of some closely existing IDSs mechanism.

[1]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Geetha Jayakumar,et al.  Ad Hoc Mobile Wireless Networks Routing Protocols - A Review , 2007 .

[4]  Tarek R. Sheltami,et al.  Detecting misbehaving nodes in MANETs , 2010, iiWAS.

[5]  H. T. Mouftah,et al.  AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[6]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[7]  Michel Barbeau,et al.  Principles of ad hoc networking , 2007 .

[8]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[9]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .

[11]  K. Selvakumar,et al.  Eaack- A Secure Intrusion Detection System for Manets , 2015 .

[12]  Neeraj Kumar,et al.  Security and Trust Management in MANET , 2011 .

[13]  S Neelavathy Pari,et al.  Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[14]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[15]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[16]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[17]  Tarek R. Sheltami,et al.  Detecting Forged Acknowledgements in MANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[18]  Ramin Hekmat,et al.  Ad-hoc networks - fundamental properties and network topologies , 2006 .

[19]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[20]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.