Abstract

The security of data becomes more important with the increased use of commercial applications over wireless network environments. We presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node Isolation, Route Disruption and Resource Consumption. There were better methods and intruder handling procedures available for fixed networks but it was difficult to analyze attacks in the mobile adhoc environments. The reason was due high mobility of network nodes and lack of fixed infrastructure. Normally, attacks by an intruder cause unauthorized use of the wireless network so that the whole network will be suffered from packet losses and reduced throughput. So, we have performed a study on various issues of threats for Mobile Adhoc Networks and presented an approach to handle such threats efficiently. The main principle was to use my-AODV agent to introduce various attacks on existing AODV MANET routing protocol.

Highlights

  • A Mobile Adhoc Network (MANET) is an autonomous system of mobile nodes connected by wireless links

  • Intrusion detection techniques geared towards wired networks cannot, is applied directly to wireless networks

  • Detection part used to identify the possible intruder in the network environment which can be further sub-divided into normal mode and attack mode

Read more

Summary

INTRODUCTION

A Mobile Adhoc Network (MANET) is an autonomous system of mobile nodes connected by wireless links. In contrast to signature detection, is able to detect novel attacks by recognizing any deviance from norm which characterizes network/system/user's normal behaviors. Computer Sci., 4 (3): 245-251, 2008 are events distinguishable from normal legitimate use of system resources This type of anomaly detectors are able to detect novel attacks, they are prune to high false positive rate due to the difficulty of clear segmentation between normal and abnormal activities and the use of insufficient or inadequate features to profile normal behaviors. Intrusion detection techniques geared towards wired networks cannot, is applied directly to wireless networks This is especially because of the latter’s lack of a fixed infrastructure, mobility, the vulnerability of wireless transmissions to eavesdropping and the lack of a clear separation between normal and abnormal behavior of the nodes. The proposed Wireless Intrusion Detection System has been simulated using NS-2 environment in Linux platform

SYSTEM DESIGN
PERFORMANCE ANALYSIS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.