Open Access Open Access  Restricted Access Subscription Access

Implement Dynamic Approach for Anomaly Detection in AODV for Manet

R Manikandan

Abstract


 Due to their unique characteristics, such as the dynamic changing topology, the absence of central management, the cooperative routing mechanisms, and the resources constraints, Mobile ad hoc networks (MANETs) are relatively vulnerable to both active and passive attacks. In MANET, routing attacks try to disrupt the functions of routing protocol by intentionally or unintentionally dropping packets or propagating faked routing messages. However, due to their computation requirements, the prevention mechanisms are not powerful enough to secure MANET. Mobile ad hoc networks (MANETs) are relatively vulnerable to malicious network attacks, and therefore, security is a more significant issue than infrastructure-based wire-less networks. In MANETs, it is difficult to identify malicious hosts as the topology of the network dynamically changes. A malicious host can easily interrupt a route for which it is one of the forming nodes in the communication path. Since the topology of a MANET dynamically changes, the mere use of a static baseline profile is not efficient. We proposed a new anomaly-detection scheme based on a dynamic learning process that allows the training data to be updated at particular time intervals. Our dynamic learning process involves calculating the projection distances based on multidimensional statistics using weighted coefficients and a forgetting curve.  


Full Text:

PDF

References


“A route stability-based optimized AODV protocol” by E.D.Kanmani Ruby, Assistant Professor, S.Rajasurya , K.Swarnam. Conference Proceedings. RTCSP'09.

“Securing AODV for MANETs using Message Digest with Secret Key “by Mr. Kamaljit Lakhtaria, Prof. Bhaskar N. Patel, Mr. Satish G. Prajapati, Dr. N. N. Jani. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009.

“Adaptive backup routing for ad-hoc networks” by Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin. Computer Communications 30 (2007) 453–464.

“Utilization of AODV in Wireless Ad Hoc Networks” by Zeyad M. Alfawaer, GuiWei Hua, and Nidal Abu Hamdeh. Journal of Computer Science 3 (4): 218-222, 2007.

VINT Group, UCB/LBNL/VINT Network Simulator ns-2. [Online]. Available:

http://www.isi.edu/nsnam/

C.E. Perkins and E.M. Royer, “RFC3561: Ad hoc on-demand distance vector (AODV) routing”, Internet RFCs, RFCs, Jul. 2003.

IVAN STOJMENOVIC, “Handbook of Wireless Networks and Mobile Computing”, wiley Edition, 2008.

Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection system for Ad Hoc Network,” (SASN’03) Proceedings of the 1st ACM workshop on security of Ad hoc and Sensor Networks.

Zonghuz Zhang, Farid Nait-Abdesselam, Pin-Han Ho, Xiaodong Lin, “RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks”, IEEE Wirless Communications and Networking Conference, 2008. (WCNC 2008).

Yi-an Huang, WeiFan, Wenke Lee, Philip S. Yu, “Cross – Feature Analysis for Detecting Ad-Hoc Rouitng Anomalies,” T.J. Watson Research Center, IBM, 2002.

A. Rajaram, Dr.S. Palaniswami, “Malicious Node Detection System for Mobile Ad hoc Networks,” International Journal of Computer Science and Information Technologies, Vol .1 (2), 2010.

Li Zhao and Jose G. Delgado – Frias, “MARS: Misbehavior Detection in Ad Hoc Networks, “ in proceedings of IEEE conference on Global Telecommunications Conference, Nivember 2007.

S. MAdhavi and Dr. Tai Hoon Kim, “ AN INTRUSION DETECTION SYSTEM IN MOBILE AD

HOC NETWORKS”, International Journal of Security and its applications, Vol. 2, No.3, July 2008.

T.V.P. Sundararajan, Dr. A. Shanmugam, “Behavior based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET,” International Journal of Computer Science and Security (IJCSS) Volume (3): Issue (2).


Refbacks

  • There are currently no refbacks.