Abstract

Since Mobile Ad hoc Network (MANET) has distributed network structure using wireless links, designing efficient security applications has become a critical need. Selfish nodes are nodes that refuse to forward the data from other nodes. The existence of selfish nodes will disturb the normal process of the network, and reduce the network performance. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviors in the network operation by monitoring the traffic flow. Each monitoring node need to execute the IDS module. The common problems encountered by the monitoring nodes are energy depletion, link disconnection, mobility and coverage. Hence the selection of monitoring nodes plays an important role in IDS. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks. In this technique, the whole network is virtually divided in smaller grid like zones. In each grid, the nodes with higher stability and better coverage are assigned a reward value. A cost metric is derived in terms of energy consumption and computational delay. Then the nodes with minimum cost and high reward are selected as monitoring nodes. By simulation results, it is shown that the proposed technique has reduced detection delay, energy consumption and detection overhead.

Highlights

  • Mobile Ad hoc Network (MANET) is fundamentally a selforganizing network composed of plentiful nodules which are proficient of great flexibility and are associated to each other in a wireless method

  • A cost metric is derived in terms of energy consumption and computational delay

  • The nodes with minimum cost and high reward are selected as monitoring nodes

Read more

Summary

INTRODUCTION

Mobile Ad hoc Network (MANET) is fundamentally a selforganizing network composed of plentiful nodules which are proficient of great flexibility and are associated to each other in a wireless method. In Sybil attack, an attacker can create more than one identity on a single physical device in by launching a coordinated attack on the network [7]. Among these attacks, DoS, packet dropping attack and cheating attack are considered in this paper. Intrusion Detection System (IDS) is a scheme for detecting any misbehaviour in the network operation by monitoring the traffic flow [8]. This paper develops a technique for deployment and selection of monitoring nodes for detection of selfish attacks.

RELATED WORKS
PROPOSED SOLUTION
ENERGY CONSUMPTION
Deployment of Monitoring Nodes
18. End For
Simulation Parameters
Results & Analysis
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call