A local intrusion detection routing security over MANET network

Mobile Adhoc Network (MANET) is a group of wireless nodes that are distributed without relying on any standing network infrastructure. MANET routing protocols were designed to accommodate the properties of a self-organized environment without protection against any inside or outside network attacks. In this paper, we propose a Local Intrusion Detection (LID) security routing mechanism to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased. Simulation results using the GloMoSim simulator show that the improvement ratio of the throughput gained by LID security routing mechanism and overall improvement reduction in the end-to-end delay and routing overhead.

[1]  Peter Martini,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[2]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[5]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .

[6]  Mingzeng Hu,et al.  A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[7]  Rajendra V. Boppana,et al.  Integrated prevention and detection of byzantine attacks in mobile ad hoc networks , 2009 .

[8]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[9]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[10]  Lang Tong,et al.  Timing-based localization of in-band wormhole tunnels in MANETs , 2010, WiSec '10.

[11]  S. Muknahallipatna,et al.  Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .

[12]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[13]  Bharat Bhargava,et al.  On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[14]  Mario Gerla,et al.  GloMoSim: A Scalable Network Simulation Environment , 2002 .

[15]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[16]  Bohyung Han,et al.  Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.