DETECTION AND ISOLATION OF ATTACKS IN MANET USING TS-AOMDV

Authors

  • Rajesh D
  • Keiser Jahana S
  • Sivakalai R
  • Jasmin Meera Banu P

DOI:

https://doi.org/10.20894/IJMSR.117.008.001.016

Keywords:

Mobile Ad-hoc Network; Intrusion Detection System; Trust; Attack Identification and Isolation.

Abstract

A mobile ad hoc network (MANET) is a collection of wireless nodes, which works well only if those mobile nodes are good and behave cooperatively. The lack of infrastructure support and resource constraint is the key issue that causes dishonest and non-co-operative nodes. Therefore, MANET is vulnerable to serious attacks. To reduce the hazards from such nodes and enhance the security of the network, this paper extends an Ad hoc On- Demand Multipath Distance Vector (AOMDV) Routing protocol, named as Trust-based Secured Adhoc On-demand Multipath Distance Vector (TS-AOMDV), which is based on the nodes’ routing behavior. The proposed TSAOMDV aims at identifying and isolating the attacks such as flooding, black hole, and gray hole attacks in MANET. With the help of Intrusion Detection System (IDS) and trust-based routing, attack identification and isolation are carried out in two phases ofrouting such as route discovery and data forwarding phase. IDS facilitates complete routing security by observing both control packets and data packets that are involved in the route identification and the data forwarding phases. To improve the routing performance, the IDS integrates the measured statistics into the AOMDV routing protocol for the detection of attackers. This facilitates the TS-AOMDV to provide better routing performance and security in MANET. Finally, the Trust based Secured AOMDV, TS-AOMDV is compared with the existing AOMDV through the NS2 based simulation model. The performance evaluation reveals that the proposed TS-AOMDV improves the performance in terms of throughput by 57.1% more thanthat of an AOMDV under adversary scenario. The simulated results show that the TS-AOMDV outperforms the AOMDV routing protocol.

Downloads

Download data is not yet available.

Author Biographies

Rajesh D

Assistant Professor, Department of Computer Science and Engineering, Universal College of Engineering and Technology, Vallioor, Tamil Nadu, India.

Keiser Jahana S

UG Scholar, Department of Computer Science and Engineering, Universal College of Engineering and Technology, Vallioor, Tamil Nadu, India

Sivakalai R

UG Scholar, Department of Computer Science and Engineering, Universal College of Engineering and Technology, Vallioor, Tamil Nadu, India.

Jasmin Meera Banu P

UG Scholar, Department of Computer Science and Engineering, Universal College of Engineering and Technology, Vallioor, Tamil Nadu, India

References

[1] Erciyes, K. "Distributed Graph Algorithms for Computer Networks", Computer Communications and Networkss , London: Springer, pp. 259- 275, 2013.

[2] S. Abdel Hamid, H. Hassanein and G. Takahara, "Routing for Wireless Multi-Hop Networks: Unifying Features", SpringerBriefs in Computer Science, pp. 11-23, 2013.

[3] Hamid, S. A., Hassanein, H., & Takahara, G., “Routing for Wireless Multi Hop Networks–Unifying and Distinguishing Features”, School of Comp.—Queen’s University, Canada, report 583, 2011.

[4] Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD , pp. 529-533 , 2013.

[5] A. Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, "A survey on trust based detection and isolation of malicious nodes in adhoc and sensor networks", Frontiers of Computer Science, vol. 9, no. 2, pp. 280-296, 2015.

[6] I. Abdel-Halim, H. Fahmy and A. Bahaa-Eldin, "Agent-based trusted on-demand routing protocol for mobile ad-hoc networks", Wireless Netw, vol. 21, no. 2, pp. 467-483, 2015.

[7] Mahmoud, Mohamed MEA, and Xuemin Sherman Shen. "Secure routing protocols." Security for Multi-hop Wireless Networks. Springer International Publishing, pp. 63-93, 2014.

[8] Shanmuganathan, V., and T. Anand. "A Survey on Gray Hole Attack in MANET." IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), pp. 2250-3501, 2012.

[9] Tayal, S., & Gupta, V., "A Survey of Attacks on Manet Routing Protocols", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, No.6, pp. 2280-2285, 2013.

[10] Vaidya, Binod, et al. "Secure multipath routing scheme for mobile ad hoc network." Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 163-171, 2007.

[11] C. Tachtatzis and D. Harle, "Performance evaluation of multi-path and single-path routing protocols for mobile ad-hoc networks", Performance Evaluation of Computer and Telecommunication Systems,2008. SPECTS 2008. International Symposium on, pp. 173-180, 2008.

[12] K. Yu, C. Yu and S. Yan, "An Ad Hoc Routing Protocol with Multiple Backup Routes", Wireless Personal Communication, vol. 57, no. 4, pp. 533-551, 2011.

[13] Soundararajan, S., & Bhuvaneswaran, R. S., "Ant Based Multi-path Routing for Load Balancing and Congestion Control in MANETs", Journal of Information & Computational Science, 2012.

[14] Eliana Stavrou, Andreas Pitsillides,"survey on secure multipath routing protocols in WSNs," Computer Networks, vol. 54, no.13,pp 2215–2238, 2010.

[15] Mitchell, R., & Chen, R, "A survey of intrusion detection in wireless network applications", Computer Communications, vol.42, pp. 1-23, 2014.

[16] Mitchell, R.; Chen, I.-R., "Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems," in Dependable and Secure Computing, IEEE Transactions on , vol.12, no.1, pp.16-30, 2015.

[17] Mitchell, R., & Chen, I. R., "Specification based intrusion detection for unmanned aircraft systems", Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications, pp. 31-36, 2012.

Downloads

Published

2016-12-12

Issue

Section

Articles