Monitor Dependent Intrusion Detection Technique for Mobile Ad Hoc Networks

We present an intrusion detection mechanism that uses collaborative efforts of the nodes in a neighborhood to detect aberrant behavior in a mobile ad hoc network. A node showing this kind of behavior is termed as a malicious node. The technique is designed for detection of malicious nodes in a neighborhood in which each pair of nodes are within radio range of each other. Such a neighborhood of nodes is known as a clique. This technique uses message passing between the nodes. A node called the monitor node initiates the detection process. The monitor node sends data packets to two other nodes, called target nodes, through the node which has to be tested for malicious behavior. The monitor node then requests each of these two nodes to return back the data packets that have been sent to them by the node under consideration. The monitor node compares this data with the one it had sent out. Based on this, the monitor determines which of the nodes are secure and which of them are suspicious. Finally, the monitor node, with the help of secure nodes, separates malicious nodes from the suspicious nodes. The technique detects k number of malicious nodes in a set of 2k+2 nodes.

[1]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[6]  Sajal K. Das,et al.  WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.

[7]  Hossam S. Hassanein,et al.  Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[8]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[9]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[10]  Constantine N. Manikopoulos,et al.  Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[11]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[12]  Amitabh Mishra,et al.  Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).