scholarly journals Learning from Routing Information for Detecting Routing Misbehavior in Ad Hoc Networks

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6275
Author(s):  
Robert Basomingera ◽  
Young-June Choi

Owing to ad hoc wireless networks’ properties, the implementation of complex security systems with higher computing resources seems troublesome in most situations. Therefore, the usage of anomaly or intrusion detection systems has attracted considerable attention. The detection systems are implemented either as host-based, run by each node; or as cluster/network-based, run by cluster head. These two implementations exhibit benefits and drawbacks, such as when cluster-based is used alone, it faces maintaining protection when nodes delay to elect or replace a cluster head. Despite different heuristic approaches that have been proposed, there is still room for improvement. This work proposes a detection system that can run either as host- or as cluster-based to detect routing misbehavior attacks. The detection runs on a dataset built using the proposed routing-information-sharing algorithms. The detection system learns from shared routing information and uses supervised learning, when previous network status or an exploratory network is available, to train the model, or it uses unsupervised learning. The testbed is extended to evaluate the effects of mobility and network size. The simulation results show promising performance even against limiting factors.

2018 ◽  
Vol 6 (2) ◽  
pp. 7-12
Author(s):  
P. Sreenivsulu ◽  
◽  
Dr. K. Ramesh Reddy ◽  

In recent years with increasing number of wireless devices Ad Hoc Networks become a vital technology. But these networks are highly vulnerable to attacks due to several reasons such as changing topology, open medium and lack of centralized monitoring. Current intrusion detection systems are based on either rule based or behavior model. The efficiency of such IDS is based on how accurate they identify the attacks. In clustering a cluster head is selected as coordinator for performing transmissions in both inter and intra cluster environment. There are many models for choosing a cluster head in Ad Hoc environment. However if the cluster head itself is a compromised node then the cluster head can launch attacks without being detected since its IDS is already malfunctioned. In this paper we propose an “Enhanced Cooperative Tamper Evident Agent Based Anomaly Intrusion Detection System”, which helps in identifying the attacks more accurately even if cluster head is compromised.


Author(s):  
John Felix Charles Joseph ◽  
Amitabha Das ◽  
Boon-Chong Seet ◽  
Bu-Sung Lee

Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized nodes, the lack of infrastructure, and so forth. Furthermore, in addition to application-based attacks, ad hoc networks are prone to attacks targeting routing protocols. Issues in intrusion detection in ad hoc networks are addressed by numerous research proposals in literature. In this chapter, we first enumerate the properties of ad hoc networks which hinder intrusion detection systems. After that, significant intrusion detection system (IDS) architectures and methodologies proposed in the literature are elucidated. Strengths and weaknesses of these works are studied and are explained. Finally, the future directions which will lead to the successful deployment of intrusion detection in ad hoc networks are discussed.


Author(s):  
Mohammed Erritali ◽  
Bouabid El Ouahidi

In recent years, the security issues on Vehicular ad hoc networks (VANETs) have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attack countermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classify current techniques of Intrusion Detection System (IDS) aware VANETs.


The key determination of researches on cluster-based Mobile Ad-hoc Networks (MANETs) and the election of consistent energy holding Cluster Head (CH) is to improve the lifetime of the network. Both in real-time as well as non-real-time basis data are collected and spread accordingly. Energy efficiency is said to be the major concern in MANET. Every node in the network supplied with preferred node energy and it will get exhausted whenever node transmits the data. When node runs out of energy transmission may be failed. In order to avoid transmission failure, energy-efficient methods are incorporated in data transmission. In this paper, a clustering method is proposed which is grounded by the Grid-based model. Static sinks in the MANET transmit the data to the transmission area which is distant to the destination that may lead to the energy-hole problem. Hence, an efficient approach is proposed wherein a centralized cluster configuration by the mobile sink is used for Grid-Based Clustering (GBC) and Verification algorithm to achieve improved energy balance to thereby extending network lifetime in the network. The simulation results depict that the GBC and Verification method can effectively increase the network lifetime and energy dissipation.


2014 ◽  
Author(s):  
Lance Joneckis ◽  
Corinne Kramer ◽  
David Sparrow ◽  
David Tate

2013 ◽  
Vol 660 ◽  
pp. 184-189 ◽  
Author(s):  
Yan Zhai ◽  
Xing Wei ◽  
Lei Liu ◽  
Liao Yuan Wu

In order to tackle the data transmission bottlenecks of the gateway node in clustering Ad hoc Networks, the paper proposes a communication method. Firstly, DMAC (Distributed and Mobility-Adaptive Clustering) algorithm and Omni-directional antenna is well introduced and discussed. Then the ICMMDA (The Inter-cluster Communication Method based on Directional Antennas) policy building virtual channels between two hops away cluster-head and using directional antenna is brought about. Lastly, the simulation shows that the method can reduce the end-to-end delay between two clusters and improve the network throughput.


Sign in / Sign up

Export Citation Format

Share Document