IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 3, March 2011 Edition
A Distributed Administration Based Approach for Detecting and Preventing Attacks on Mobile Ad Hoc Networks
Full Text(PDF, 3000)  PP.  
Himadri Nath Saha, Prof. (Dr.) Debika Bhattacharyya, Prof.(Dr.) P. K. Banerjee
Black hole attack, Blackmail attack, MANET,Gray hole attack, Flooding, Watch Node, Adminstrator.
In Mobile Ad Hoc Networks (MANET), security is a challenging issue due to the vulnerabilities that are associated with it. Intrusion detection is therefore incorporated as a second line of defense in addition to key based authentication schemes. The range of attacks that can be mounted on MANETs are also wider than in case of conventional static networks. In mobile wireless networks there is no infrastructure as such and so it becomes even more difficult to efficiently detect malicious activities by the nodes inside and outside the network. As a matter of fact, the boundary of the network is not properly defined. Nodes can intermittently come into the network or leave it. Moreover malicious nodes can flood the network with junk packets hampering the network service or intentionally drop packets. But these nodes can subtly manipulate their harmful activities in such a manner that it becomes difficult to declare a node as malicious. On top of that these nodes can cooperate among themselves to fool the other nodes to judge an innocent node as malicious. In this paper, we combine a proactive and a reactive approach to take care of some of the problems relevant to MANETs.
[1] P. Agrawal, R.K Ghosh, S.K. Das, “Cooperative black and gray hole attacks in mobile ad hoc networks”, ICUIMC’08.

[2] I. Khalil, S. Bagchi, N.B. Shroff, “MOBIWORP: Mitigation of the Wormhole attack in mobile multihop wireless network”, Elsevier, 2007.

[3] S.A Razak, S. Furnell, N. Clarke, P. Brooke, “A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach”, Springer-Verlag Berlin Heidelberg 2006.

[4] H. Deng, Wei Li, D.P Agrawal, ”Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, vol. 40, pp. 70-75, 2002.

[5] S. Ramaswamy, H. Fu, M. Sreekanaradhya, J. Dixon, K. Nygard, “Prevention of Cooperative Blackhole Attack in Wireless Ad Hoc Networks”, Proceedings of 2003 International Conference on Wireless Networks, Las Vegas, Nevada, USA, pp. 570-575.

[6] I. Rubin, A. Behzad, R. Zhang, H. Luo, E. Caballero, “TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks”, Proceedings of IEEE Aerospace Conference, 2002, vol. 6, pp. 2727-2740.

[7] A.A Cardenas, T. Roosta, S. Sastry, “Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems”, Elsevier, 2009.

[8] P.R Kumar, L.L Xie, “Ad Hoc Wireless Networks: From Theory to Protocols”, Ad Hoc Wireless Networking, Kluwer Academic Publishers, 2004, pp. 175-195.

[9] W. Lou, Y. Fang, “A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available solutions”, Ad Hoc Wireless Networking, Kluwer Academic Publishers, 2004, pp. 319-364.

[10] C.S.R. Murthy, B.S. Manoj, “Ad Hoc Wireless Networks”, Pearson, 2004.

[11] J. Schiller, “Mobile Communications”, Pearson, 2003.

Untitled Page