Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks

The indefinite need of dynamic environment has always imposed a concern on ad hoc networks and its application. It is often found that the internal nodes in such infrastructureless network are compromising with the trust factor to forward the packets and are able to exploit the trust to create different types of attacks such as black hole, worm hole, DDoS etc. The recent literature survey in this line of study gives an impression to the fact that the trust for the internal nodes in the networks has been emphasized less while designing any security approach for the routing protocols. Besides, the concept of watchdog/pathrater has been considered to be an inefficient if used alone. Therefore, in this paper, we have proposed an algorithm using intrusion detection and authentication method to provide enough trust in the routing path. The algorithm is having two layer of security aspect: watchdog-pathrater is used as the first layer along with a threshold value and secondly, end-to-end authentication is used to maintain the trust among the nodes in the network. The results are simulated in Network Simulator-2 (NS2). The results of the simulation show that the proposed algorithm minimizes the attacks in routing path. We have also compared our proposed algorithm with the two existing algorithm recently identified in the literature. The comparison also depicts the fact of the efficiency of our algorithm.

[1]  D. Lalitha Bhaskari,et al.  Effective Hybrid Intrusion Detection System: A Layered Approach , 2015 .

[2]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[3]  Vijay Varadharajan,et al.  Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[4]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  B. Muthukumar,et al.  Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .

[7]  Sachin Bojewar,et al.  An Intrusion Detection System for MANETs , 2015 .

[8]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[9]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[10]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[11]  Sanjay Sharma,et al.  Intrusion Detection System: A Review , 2015 .

[12]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[13]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.