15-01-2014, 12:26 PM
A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS
RECENT SECURE INTRUSION.pdf (Size: 605.95 KB / Downloads: 154)
Abstract
Mobile Ad hoc Network is a collection of wireless mobile nodes forming a network without using any existing infrastructure.
MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each
other via bi-directional wireless links either directly or indirectly. A new intrusion detection system named Enhanced Adaptive
Acknowledgement (EAACK) specially designed for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting
malicious nodes despite the existence of false misbehavior report and compared it against other popular mechanisms in differ-
ent scenarios through simulation. The results will demonstrate positive performances against Watchdog, TWOACK
and
AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACK demonstrates
higher
malicious behavior detection rates in certain circumstances while does not greatly affect the network perfor-
mances.
INTRODUCTION
Over the past decade, there has been a growing interest
in wireless networks, as the cost of mobile devices such
as PDAs, laptops, cellular phones, etc have reduced
drastically. The latest trend in wireless networks is
towards pervasive and ubiquitous computing - catering to
both nomadic and fixed users, anytime and anywhere.
Several standards for wireless networks have emerged in
order to address the needs of both industrial and
individual users. One of the most prevalent forms of
wireless networks in use today is the Wireless Local Area
Network (WLAN). In such a network, a set of mobile
nodes are connected to a fixed wired backbone. WLANs
have a short range and are usually deployed in places
such universities, companies, cafeterias, etc. However,
there is still a need for communication in several
scenarios of deployment where it is not feasible to deploy
fixed wireless access points due to physical constraints of
the medium.
MOBILE ADHOC WIRELESS NETWORK:
The Mobile Ad hoc Wireless Network is more vulner-
able to be attacked than wired network. These vulnerabil-
ities are nature of the MANET structure that cannot be
removed. As a result, attacks with malicious intent have
been and will be devised to exploit these vulnerabilities
and to cripple the MANET operation. Attack prevention
measures, such as authentication and encryption, can be
used as the first line of defense for reducing the possibili-
ties of attacks. However, these techniques have a limita-
tion on the effects of prevention techniques in general
and they are designed for a set of known attacks. They
are unlikely to prevent newer attacks that are designed
for circumventing the existing security measures. The
rest of this chapter is organized as follows – initially a
classification of wireless networks in use today is de-
scribed followed by the background and origins of ad hoc
wireless networks. The general issues in ad hoc wireless
networks are then discussed, followed by a few interest-
ing applications. The final section gives an outline of the
chapters to follow.