An Acknowledgement based Intrusion Detection System using ECDSA for Detecting Malicious Node in MANET

Mobile Ad hoc network is a group of wireless mobile nodes generating a network not by using any existing infrastructure. MANET is a collection of mobile nodes equipped with a wireless-transmitter and receiver that in contact with each other via bi-directional wireless links either directly or indirectly. An encroachment detection system named Enhanced Adaptive Acknowledgement (EAACK) specially designed for MANETs. By the acceptation of MRA scheme, EAACK is capable of finding malicious nodes contempt the existence of the false misbehavior report and equate it against other popular mechanisms in different scenario through simulation. The results will exhibit positive performances against thefalse misbehavior report. EAACK demonstrates higher leering behavior detection rates in certain circumstances while does not greatly affect the network performances.Malicious attackers to falsely report innocent nodes as malicious can produce the false misbehavior report. EAACK is an acknowledgment-based encroachment detection system.This attack can be deadly to the entire network when the attackers break down sufficient nodes and thus cause a network division.The introduction of digital signature (DSA) is to prevent the attacker from counterfeitacknowledgment packets.

[1]  Tarek R. Sheltami,et al.  Detecting misbehaving nodes in MANETs , 2010, iiWAS.

[2]  John A. Clark,et al.  Intrusion Detection in Mobile Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[3]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[4]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  Tarek R. Sheltami,et al.  Detecting Forged Acknowledgements in MANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[8]  G. Murugaboopathi,et al.  A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS , 2013 .

[9]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[10]  Jin-Shyan Lee,et al.  A Petri Net Design of Command Filters for Semiautonomous Mobile Sensor Networks , 2008, IEEE Transactions on Industrial Electronics.

[11]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[12]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[13]  Sugata Sanyal,et al.  Mobile Ad Hoc Network Security , 2009 .

[14]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.