Abstract

Intrusion detection is one of challenging issues in wireless networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based Mobile ad hoc network environment. The model comprises of mobile agents, which are used to detect intrusions, respond to intrusions, mainly preventing the routing attacks while securing them and distributing selected and aggregated intrusion information to all other nodes in the network in an intelligent manner to compensate the attack. The model is simulated to test its operation effectiveness by considering various performance parameters such as, packet delivery ratio, communication overhead, throughput. It implements a secure detection and prevention technique that contains the Blowfish algorithm which is a symmetric encryption and decryption algorithm having a secure standard till date against attacks to make the network transmission secure while monitoring malicious nodes and preventing them from compromising the integrity of the network. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, and flexibility.

Highlights

  • In MANETs, the scope of getting attacked increases by the malicious node which proves vulnerable to compromising of the data as well as the communication between nodes in the network architecture as the nodes being mobile in nature and having no centralized administration makes it prone to intrusion

  • The agent can react to changes in its environment such as changes in user behaviour, change in neighbours of a node, etc. anticipate the changes in the mobile ad-hoc networks environment and take appropriate decisions

  • Two Acknowledgement (TWOACK) based intrusion detection system proposed by Liu et al [9] is used to avoid the collusion and limited transmission power by sending acknowledgment every transmission of data packets with two hops away from it from source to destination with three consecutive nodes

Read more

Summary

Introduction

In MANETs, the scope of getting attacked increases by the malicious node which proves vulnerable to compromising of the data as well as the communication between nodes in the network architecture as the nodes being mobile in nature and having no centralized administration makes it prone to intrusion. Some of the activities where this feature can be observed are: monitor the battery life, power requirements to neighbours, reliable neighbours, discover routes in anticipation to link breaks, checking intruders, studying legitimate user behaviour patterns, etc. It makes use of simple all operations done by simple XOR, look up table with 32 bit key words

Related works
Proposed system
Simulation results and discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.