scispace - formally typeset
Journal ArticleDOI

An intrusion detection & adaptive response mechanism for MANETs

Reads0
Chats0
TLDR
An intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation and an analysis of the impact shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.
Abstract
Mobile ad hoc networks are vulnerable to a variety of network layer attacks such as black hole, gray hole, sleep deprivation & rushing attacks. In this paper we present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation. We consider the deficiencies of a fixed response to an intrusion; and we overcome these deficiencies with a flexible response scheme that depends on the measured confidence in the attack, the severity of attack and the degradation in network performance. We present results from an implementation of the response scheme that has three intrusion response actions. Simulation results show the effectiveness of the proposed detection and adaptive response mechanisms in various attack scenarios. An analysis of the impact of our proposed scheme shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.

read more

Citations
More filters
Journal ArticleDOI

How Can Heterogeneous Internet of Things Build Our Future: A Survey

TL;DR: A four-layer HetIoT architecture consisting of sensing, networking, cloud computing, and applications is proposed, including self-organizing, big data transmission, privacy protection, data integration and processing in large-scale Het IoT.
Journal ArticleDOI

From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions

TL;DR: This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of the in-depth understanding of the response option for different types of network attacks.
Journal ArticleDOI

Intrusion response systems

TL;DR: An IRS taxonomy based on design parameters to classify existing schemes is presented and the essential response design parameters for IRS to mitigate attacks in real time and obtain a robust output are investigated.
Journal ArticleDOI

The rise of malware

TL;DR: The number of papers published by Asian countries such as China, Korea, India, Singapore and Malaysia in relation to the Middle East and North America is discussed and there are several significant impacts of research activities in Asia, in comparison to other continents.
Journal ArticleDOI

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
References
More filters
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Proceedings ArticleDOI

Rushing attacks and defense in wireless ad hoc network routing protocols

TL;DR: The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols.
Journal Article

Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method.

TL;DR: An anomaly detection scheme using dynamic training method in which the training data is updated at regular time intervals is proposed and the simulation results show the effectiveness of the scheme compared with conventional scheme.
Journal ArticleDOI

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Proceedings ArticleDOI

Resisting flooding attacks in ad hoc networks

TL;DR: Flood attack prevention (FAP), a generic defense against the ad hoc flooding attack in mobile ad hoc networks, is developed, composed of neighbor suppression and path cutoff.
Related Papers (5)