Call For Paper Volume:4 Issue:8 Aug'2017 |

Intrusion Detection Techniques for Cooperation of Node in Mobile ad hoc network (MANET)

Publication Date : 29/12/2015



Author(s) :

Mangalmoy Pradhan , Rakesh Kumar Singh.


Volume/Issue :
Volume 2
,
Issue 12
(12 - 2015)



Abstract :

Since there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose punishment as well. It is very difficult to design once-for-all intrusion detection techniques. Instead, an incremental enhancement strategy may be more feasible. A secure protocol should at least include mechanisms against known attack types. In addition, it should provide a scheme to easily add new security features in the future. Due to the importance of MANET routing protocols, we focus on the detection of attacks targeted at MANET routing protocols This include WatchDog and Pathrater approach. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A path rater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defined at the source node. This routing information is passed together with the message through intermediate nodes until it reaches the destination.


No. of Downloads :

7


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

Intrusion Detection Techniques for Cooperation of Node in Mobile ad hoc network (MANET)

December 28, 2015