Adaptive ACKnowledgement technique with key exchange mechanism for MANET

Mobile Adhoc NETwork (MANET) is self configuring network of mobile nodes connected by wireless links and it is considered as network without infrastructure. Routing protocol in MANET operates on the basic assumption that nodes are fully cooperative. Because of open infrastructure and limited battery power some nodes may not cooperate correctly. These nodes start refusing to forward data packets or drop them thereby degrades the performance of network. So it is very essential to develop an Intrusion Detection System (IDS) to prevent MANET from attacks. The IDS Watchdog, fails to detect node misbehavior in the presence of ambiguous collisions, receiver collisions, limited transmission power, false misbehavior, collusion and partial dropping. An intrusion detection system named Enhanced Adaptive ACKnowledgment (EAACK) has been developed which consists of three parts, namely, ACK, Secure ACK (S-ACK), and Misbehavior Report Authentication (MRA). All the acknowledgement packets are digitally signed and verified to prevent forged acknowledgement packets. For signing and verifying the acknowledgement packets, keys are generated and distributed in advance. The proposed system uses One-hop ACK which is used to improve misbehavior detection rates. Basic drawback of S-ACK includes it cannot distinguish exactly which particular node is misbehaving node. Sometime well behaving nodes became a part of misbehaving link. Thus lot of well behaved node may be avoided by network which results in losing of well behaved routes. To eliminate the requirement of predistributed keys proposed system considers Diffie-Hellman Key Exchange Algorithm.

[1]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[2]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[3]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[4]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  S. Radha,et al.  Co-operative Approach to Detect Misbehaving Nodes in MANET Using Multi-hop Acknowledgement Scheme , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[7]  Anisha John,et al.  Secure Intrusion Detection Sytem for MANET , 2016 .

[8]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[9]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[10]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.