scispace - formally typeset
Proceedings ArticleDOI

Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol

TLDR
A cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system is proposed.
Abstract
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.

read more

Citations
More filters
Journal ArticleDOI

ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing

TL;DR: The proposed consolidated approach, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network, which enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency.

A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks

Adam Solomon
TL;DR: The following lists the main characters from the film version of The God of Small Things, which was released in cinemas around the world in 2016.
Proceedings ArticleDOI

Survey of hash security on DSR routing protocol

TL;DR: The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
References
More filters
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Proceedings Article

Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Posted Content

Observation-based Cooperation Enforcement in Ad Hoc Networks

TL;DR: OCEAN is found that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges, and could possibly help obviate solutions requiring trust-management for some contexts.
Related Papers (5)