Robust Intrusion Detection Mechanism for Mobile Adhoc Networks

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-14 Number-3
Year of Publication : 2014
Authors : Ms. Rasagna Chinthireddy , Dr. S Arvind
DOI :  10.14445/22312803/IJCTT-V14P129


Ms. Rasagna Chinthireddy , Dr. S Arvind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks". International Journal of Computer Trends and Technology (IJCTT) V14(3):135-140, Aug 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Due to their natural mobility and scalability, Mobile Adhoc NETworks (MANETs) are always preferred since the day of their invention. But the open medium nature of MANETs makes them more vulnerable to attacks and hence results in the degradation of performance. This paper proposes an ideal Intrusion Detection System called RIDM- Robust Intrusion Detection Mechanism that works with the backbone as EAACK, thus an approach that increases the performance of EAACK through Energy based Geographic Routing Protocol and also an attempt to reduce the Routing Overhead caused by acknowledgement packets in EAACK through Batch Processing.

[1] H. Miranda and L. Rodrigues, ?Preventing Selfishness in Open Mobile Ad Hoc Networks,? Proc. Seventh CaberNet Radicals Workshop, Oct. 2002.
[2] L. Buttyan and J.-P. Hubaux, ?Enforcing Service Availability in Mobile Ad-Hoc WANs,? Proc. MobiHoc, Aug. 2000.
[3] Ms. Soumya Sara Zachariah, Ms. Preetha K G, “Shortest Path Geographic Routing Protocol for Mobile Adhoc NETworks”, IJCSET.
[4] J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, ?Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project,? IEEE Comm. Magazine, Jan. 2001.
[5] L. Buttyan and J.-P. Hubaux, ?Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks,? ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, 2003.
[6] M. Jakobsson, J.-P. Hubaux, and L. Buttyan, ?A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,? Proc. Financial Cryptography Conf., Jan. 2003.
[7] S. Marti, T. Giuli, K. Lai, and M. Baker, ?Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,? Proc. MobiCom, Aug. 2000.
[8] J.-S. Lee, “A Petri net design of command filters for semiautonomous mobile sensor networks,” IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835–1841, Apr. 2008.
[9] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752.
[10] A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,” in Proc. Radio Wireless Conf., 2003, pp. 75–78.
[11] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, “Video transmission enhancement in presence ofmisbehaving nodes inMANETs,” Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273–282, Oct. 2009.
[12] Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mo- biCom `00: Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255_265, New York, NY, USA, 2000. ACM.
[13] Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE, EAACK—A Secure Intrusion-Detection System for MANETs IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013
[14] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
[15] K. Balakrishnan, J. Deng, and P.K. Varshney, ?TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,? Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.
[16] Ms. Rasagna Chinthireddy & Dr. S Aravind, “A Survey and Comparison of Intrusion Detection Systems in MANETS” , IJCTTCS,Page 58 to 64, Volume 3, Issue 3, May 2014

IDS, EAACK, Energy based Geographic Routing Protocol, Batch Processing.