A Cross Layer Approach for Intrusion Detection in MANETs

paper, we propose a cross layer approach to detect the malicious node (Black hole attack) in MANET. In this approach, the malicious node is detected by the collaborative decision made by the network layer, MAC layer and physical layer on the basis of the parameters passed by the physical and the link layer to the network layer using cross layer design, and then the best path is selected among the various paths between the source node and the destination node. The routing protocol which is used in the simulation is AODV. The malicious node is then deleted from the routing table and the performance of our technique is proved by the simulation of our system model using the network simulator NS-2.

[1]  Reiner Ludwig,et al.  Optimizing the End-to-End Performance of Reliable Flows over Wireless Links , 1999, Wirel. Networks.

[2]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[3]  R.M. Buehrer,et al.  Wireless communications: past events and a future perspective , 2002, IEEE Communications Magazine.

[4]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[5]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[6]  Yang Li,et al.  Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Hwee Xian,et al.  Dynamic Topology Control to Reduce Interference in MANETs , 2005 .

[8]  M. Motani,et al.  Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.

[9]  Nei Kato,et al.  A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[10]  Mehul Motani,et al.  The road ahead for cross-layer design , 2005, 2nd International Conference on Broadband Networks, 2005..

[11]  Bu-Sung Lee,et al.  Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.

[12]  A. Rajaram,et al.  A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks , 2009, ArXiv.

[13]  Bu-Sung Lee,et al.  CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.

[14]  Min-Hua Shao,et al.  Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[15]  Dong-You Choi,et al.  A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[16]  Patrick Tague,et al.  Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[17]  V. Kotov,et al.  A Survey of Modern Advances in Network Intrusion Detection , 2011 .

[18]  P. Kamalakkannan,et al.  A review and design study of cross layer scheme based algorithm to reduce the link break in MANETs , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[19]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .