Abstract

In this paper a novel technique has been proposed for intrusion detection in MANET, where agents are fired from a node for each node randomly and detect the defective nodes. Detection is based on triangular encryption technique (TE)[9,10], and AODV[1,2,3,8] is taken as routing protocol. The scheme is an ‘Agent’ based intrusion detection system. This technique is applied on two types of defective nodes namely packet sinking and black hole attack. For simulation purpose we have taken NS2 (2.33) and three type of parameters are considered. These are number of nodes, percentage of node mobility and type of defective nodes. For analysis purpose 20, 30, 30, 40, 50 and 60 nodes are taken with variability. Percentage of defectiveness as 10%, 20%, 30% and 40%.Packet sink and black hole attack are considered as defectiveness of nodes. We have considered generated packets, forward packets, average delay and drop packets as comparisons and performance analysis parameters.

Highlights

  • As MANET is infrastructure less and has the ability of node mobility and it is distributed in nature

  • When 20 nodes are taken: the comparison of generation packets given in the fig 4. In this figure it is seen that packet (Idect) generation is high when black hole attack occurred than simple packet sink attack occur, except when % of malicious is 10%

  • In this paper a novel technique is proposed and applied to detect intrusion in MANET using mobile Agent (‘Idect’). This novel technique is applied on two types of intrusion nodes, they are simple packet sink nodes and another is black hole node

Read more

Summary

INTRODUCTION

As MANET is infrastructure less and has the ability of node mobility and it is distributed in nature. In AODV[1,2,3,8,12] a node want to send a packet it broadcast a route request message (RERQ). Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. An agent has been triggered randomly from a node which traverses all nodes sequentially one after another till the end of nodes associated with the cell in a round It computes the security parameters and finds the conflicted activities if any which reported as malicious activities of the node. Black hole [11, 14, 16] attack is an active type of attack in MANET This type of attack the attacker selectively drop RREQ/RREP message.

PROPOSED TECHNIQUE
Forward Packets
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call