earticle

논문검색

Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes

초록

영어

A Mobile Ad hoc Network (MANET) can be defined as a network of mobile nodes that communicate over the wireless radio communication channel. It is also defined as a network without any underlying infrastructure and offers unrestricted mobility. Due to their open nature and lack of infrastructure, security for MANETs has become an intricate problem. To transmit data over such a network, generally any routing protocol that enables dynamic, self-starting multi hop routing between mobile nodes is used. However these routing protocols are vulnerable to various kinds of attacks. The conventional security mechanisms of protecting a network are not sufficient for these networks. Hence a second level of defense to detect and respond to the security problem called an Intrusion Detection System (IDS) is required. An IDS based on anomaly based intrusion detection that works by checking the behavior of the nodes was proposed to overcome some of the attacks like blackhole, grayhole and flooding attacks. Generally the malicious nodes demonstrate a different behavioral pattern of all the other normal nodes. So the specified approach where a Data Transmission Quality (DTQ) function is used to determine the behavior of the nodes as malicious or legitimate is used. The DTQ function is defined in such a way that it will be close to a constant or keep changing smoothly for genuine nodes and will keep on diminishing for malicious nodes. The proposed method was implemented using AODV as the routing protocol for transmitting data. The evaluation results show that the performance of the AODV protocol under attacks has improved significantly by using the proposed approach.

목차

Abstract
 1. Introduction
 2. Related Work
 3. AODV and Attacks in AODV
  3.1 Overview of AODV
  3.2 Attacks in AODV
 4. Intrusion Detection System
  4.1. Overview of IDS
  4.2. Distributed and Cooperative IDS
 5. Proposed Approach
  5.1. Data Collection Module
  5.2. Intrusion Detection Module
  5.3. Voting module
  5.4. Intrusion response Module
 6. Simulation Analysis
  6.1 Simulation Setup
  6.2 Simulation Results
 7. Conclusion
 References

저자정보

  • S. Mamatha Bhoj Reddy Engineering College for Women,Hyderabad,India
  • A. Damodaram JNTU College of Engineering,Hyderabad,India

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.