Hello,
Myself Chetan Kadu.I am Mtech student making project on EAACK a secure intrusion detection system for MANET. I have to implement this project on NS2 so I want code
Migration to the wireless network of the wired network has been a worldwide trend in recent decades. The open medium and the wide distribution of nodes make MANET vulnerable to malicious attackers. A new technique of EAACK (Enhanced Adaptive Acknowledgment) method designed for MANET was proposed for the detection of intrusions. EAACK demonstrates higher detection rates for malicious behavior in certain circumstances, while it does not greatly affect the results of the network.
MANET consists of mobile mobile nodes that form a temporary network without the help of fixed infrastructure or central administration. Nodes can communicate directly with other nodes within their transmission range. Nodes outside the transmission range communicate through intermediate nodes in such a way that they form a multihost scenario. In multi-hop transmission, a packet is forwarded from one node to another until it reaches the destination using the routing protocol. For the correct operation of the network, cooperation between nodes is necessary. Here cooperation refers to performing the network functions collectively by nodes for the benefit of other nodes. But because of open infrastructure and node mobility, a lack of cooperation can occur that can severely degrade network performance.
MANET is vulnerable to various types of attacks due to open infrastructure, dynamic network topology, lack of central management, and limited battery-based power of mobile nodes. These attacks can be classified as external attacks and internal attacks. Several schemes had previously been proposed that had as their sole objective the detection and prevention of external attacks. But most of these schemes become useless when the malicious nodes already enter the network or some nodes of the network are compromised by the attacker. Such attacks are more dangerous since these are initiated from within the network and because of this the first.
The line of defense of the network becomes ineffective. Since internal attacks are performed by participating malicious nodes that behave well before they are compromised, therefore, it becomes very difficult to detect.
MANET is vulnerable to various types of attacks due to open infrastructure, dynamic network topology, lack of central management, and limited battery-based power of mobile nodes. These attacks can be classified as external attacks and internal attacks. Several schemes had previously been proposed that had as their sole objective the detection and prevention of external attacks. But most of these schemes become useless when the malicious nodes already enter the network or some nodes of the network are compromised by the attacker. Such attacks are more dangerous since these are initiated from within the network and because of this the first.
The line of defense of the network becomes ineffective. Since internal attacks are performed by participating malicious nodes that behave well before they are compromised, therefore, it becomes very difficult to detect.
Generally, routing protocols are necessary to maintain effective communication between different nodes. The routing protocol not only discovers the network topology, but also constructs the route to forward data packets and dynamically maintains routes between any pair of communicating nodes. Routing protocols are designed to adapt to frequent changes in the network due to the mobility of the nodes. Several ad hoc routing protocols have been proposed in the literature and can be classified into proactive, reactive and hybrid protocols.
MANET is able to create a network of self-configuration and self-maintenance without the aid of a centralized infrastructure, which is often not feasible in mission-critical applications such as military conflict or emergency recovery. Minimum configuration and rapid deployment make MANET ready to be used in emergency circumstances where infrastructure is not available or not feasible to install in scenarios such as natural or human disasters, military conflicts and emergency medical situations.
Securing wireless adhoc network is a very difficult problem. Attacks can be classified as denial of service attack, impersonation, spy routing attacks, black hole attack, gray hole attack, man attack in the middle, jam, replay attack, and wormhole attack.
(A) Denial of Service Attack: This attack is intended to attack the availability of a node or the entire network. If the attack is successful, the services will not be available. The attacker generally uses radio signal interference and the method of battery depletion.
(B) Impersonation: If the authentication mechanism is not implemented correctly, a malicious node can act as a genuine node and monitor network traffic. You can also send fake routing packages and gain access to confidential information.
(D) Routing Attacks: The malicious node makes routing services a target because it is an important service in MANETs. There are two flavors to this routing attack. One is the attack on the routing protocol and another is the attack on the packet delivery or delivery mechanism. The first is intended to block the propagation of routing information to a node.
(E) Attack black hole: In this attack, an attacker announces a metric zero for all destinations, making all nodes around roten packets to it. A malicious node sends false routing information, claiming that it has an optimal route and causes other good nodes to route data packets through the malicious one. A malicious node discards all packets it receives instead of normally forwarding those packets.
(F) Gray Hole Attack: This attack is also known as rogue misconduct attack which leads to dropped messages. The entire gray attack has two phases. In the first phase the node is advertised as having a valid route to the destination while in the second phase, the nodes fall intercepted packets with a certain probability.
(G) Man-in-the-middle Attack: An attacker is placed between the sender and the receiver and sniffs any information that is sent between two nodes. In some cases, the attacker may supplant the sender to communicate with the receiver or to supplant the receiver.