Intrusion Detection Techniques for Cooperation of Node in Mobile ad hoc network (MANET)

Since there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose punishment as well. It is very difficult to design once-for-all intrusion detection techniques. Instead, an incremental enhancement strategy may be more feasible. A secure protocol should at least include mechanisms against known attack types. In addition, it should provide a scheme to easily add new security features in the future. Due to the importance of MANET routing protocols, we focus on the detection of attacks targeted at MANET routing protocols This include WatchDog and Pathrater approach. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A path rater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defined at the source node. This routing information is passed together with the message through intermediate nodes until it reaches the destination. Keywords—MANET, Watchdog, Path rater, DSR

[1]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[2]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[3]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[4]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[5]  Kavitha Kumar Intrusion detection in mobile adhoc networks , 2009 .

[6]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[7]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[8]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[9]  Ivan Stojmenovic,et al.  Ad hoc Networking , 2004 .

[10]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[12]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[13]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[14]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[15]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[16]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[17]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.