Detection of Misbehaving Node using Secure Acknowledgement in MANET

被引:0
|
作者
Mali, Rasika R. [1 ]
Bagade, Sudhir T. [1 ]
机构
[1] SNDT Univ, Usha Mittal Inst Technol, Dept Comp Sci & Technol, Bombay 400049, Maharashtra, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST) | 2016年
关键词
MANET; Vulnerability in MANET; Intrusion Detection System; Acknowledgement Based Schemes; Misbehaving Nodes; Secure ACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes. Due to self configuring ability of nodes and infrastructure less nature of network, MANET is preferred in variety of applications such as military, disaster stuck areas, emergency recovery etc. MANET is vulnerable to various attacks due to its open medium and wide distribution of nodes. This itself emphasize the importance of security and need for an efficient system, for example intrusion detection system in MANET. In literature, various intrusion detection systems (IDS) have been proposed for detecting the node that misbehaves in the network. The misbehaviour such as, delay or drop in data packets or acknowledgement packets, drop packets and modify routing information etc. are present. These misbehaviour need to be detected well in advance to keep network secure. In this paper we propose and implement, new IDS named as Secure Acknowledgement (ACK) System. The Secure ACK system is purely an acknowledgement based technique. The type of misbehaviour detected by proposed system is about delay in packet transmission. In this system, for every three consecutive nodes in the route, the third node is required to send back an acknowledgement packet to the first node in the group. Based on the non-receipt of ACK packet within predefine time to the first node in the group, it reports about misbehaviour activity in the network. As soon as the proposed system detects misbehaving node present in the network, it stops the further data transmission. So, the misbehaving node will not be able to damage network thereafter.
引用
收藏
页码:611 / 616
页数:6
相关论文
共 50 条
  • [1] A Performance and Analysis of Misbehaving node in MANET using Intrusion Detection System
    Tamilarasan, S.
    Aramudan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 258 - 264
  • [2] Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET
    Poonam
    Garg, K.
    Misra, M.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 181 - 190
  • [3] Acknowledgement security for MANET using EAACK
    Suvarna, Deore
    Pallavi, Erande
    Sumitra, Lahane
    Chhaya, Dhatrak
    Korade, Mahesh
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 671 - 678
  • [4] Fully Selfish Node Detection, Deletion And Secure Replica Allocation Over Manet
    Muthumalathi, N.
    Raseen, M. Mohamed
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 413 - 415
  • [5] A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes
    Dadhich, A.
    Sarje, Dr. A. K.
    Garg, K.
    2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 728 - 735
  • [6] Deep Artificial Immune System With Malicious Node Detection and Secure Routing Protocol in MANET
    Jamaesha, S. Syed
    Gowtham, M. S.
    Ramkumar, M.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (11):
  • [7] An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET
    Dave, Dhaval
    Dave, Pranav
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1690 - 1696
  • [8] PDA-Misbehaving Node Detection & Prevention for MANETs
    Prasannavenkatesan, T.
    Raja, R.
    Ganeshkumar, P.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [9] Establishing a secure routing in MANET using a Hybrid Intrusion Detection System
    Indira, N.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 260 - 263
  • [10] Detection and avoidance of malicious node in MANET
    Patel, Kajal S.
    Shah, J. S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,