Detection of Routing Misbehaving Links in MANET by Advance EAACK Scheme

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 3
Year of Publication : 2016
Authors : Shraddha Kamble, Dr.B.K Mishra, Dr.Rajesh Bansode
  10.14445/22492615/IJPTT-V26P401

MLA

Shraddha Kamble, Dr.B.K Mishra, Dr.Rajesh Bansode "Detection of Routing Misbehaving Links in MANET by Advance EAACK Scheme". International Journal of P2P Network Trends and Technology (IJPTT), V6(3):1-5 May - Jun 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and they use radio frequencies in air to transmit and receive the data. MANETS is used in many critical and tactical operations due to flexibility provided by their dynamic structure. Hence security becomes a primary concern to have safe communication between two nodes and this itself emphasis the need for an efficient intrusion detection system in MANETs. Enhanced Adaptive Acknowledgment (EAACK) was introduced in our earlier research which has overcome the drawback of Watchdog, ACK and TWOACK to some extent. In our paper, we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness Due to continuous and changing nature of nodes MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes. In order to send the data from one node other broadcast mechanism is used which increase the overhead between two nodes. Hence, in order to increase overall efficiency and security parameters that are considered are routing overhead and throughput.

References

[1] R. Akbani, T. Korkmaz, and G. V. S. Raju, ―Mobile Ad hoc Network Security, in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
[2] R. H. Akbani, S. Patel, and D. C. Jinwala, ―DoS attacks in mobile ad hoc networks: A survey, in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
[3] T. Anantvalee and J. Wu, ―A Survey on Intrusion Detection in Mobile Ad Hoc Networks, in Wireless/Mobile Security. New York: Springer- Verlag, 2008.
[4] S. Marti, T. J. Giuli, K. Lai, and M. Baker, ―Mitigating routing misbehavior in mobile ad hoc networks, in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
[5] V. C. Gungor and G. P. Hancke, ―Industrial wireless sensor networks: Challenges, design principles, and technical approach, IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
[6] Y. Hu, D. Johnson, and A. Perrig, ―SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in Proc. 4th IEEEWorkshop Mobile Comput. Syst. Appl., 2002, pp. 3– 13.
[7] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, ―An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[8] D. Johnson and D. Maltz, ―Dynamic Source Routing in ad hoc wireless networks, in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153– 181.
[9] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, ―Video transmission enhancement in presence ofmisbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
[10] N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting misbehaving nodes in MANETs, in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.
[11] M. Zapata and N. Asokan, ―Securing ad hoc routing protocols, in Proc. ACM Workshop Wireless Secure., 2002, pp. 1–10
[12] N. Nasser and Y. Chen, ―Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,” in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154– 1159.
[13] T. Anantvalee and J. Wu, ―A Survey on Intrusion Detection in Mobile Ad Hoc Networks, in Wireless/Mobile Security. New York: Springer-Verlag, 2008.
[14] Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami ―EAACK—A Secure Intrusion-Detection System for MANETS)
[15] N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting forged acknowledgements in MANETs, in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.
[16] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, ―An acknowledgment-based approach for the detection of routing misbehaviour in MANETs, IEEE Trans. Mobile Comput., vol. 6, no. 5 pp. 536– 550, May 2007.
[17] J.-S. Lee, ―A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835–1841, Apr. 2008.

Keywords
Adaptive acknowledgment (AACK), Dynamic source routing (DSR) , Digital Signature Algorithm (DSA),EAACK (Enhanced Adaptive Acknowledgment) ,Misbehaviour Report Analysis (MRA),MANETS (Mobile Ad-hoc Networks) , IDS (Intrusion Detection System)