A Secure Intrusion Detection System for Vulnerable Attacks in Mobile Networks
Authors:A. PRASANNA LAKSHMI, M. HARATHI
Abstract: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusiondetection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Keywords: Digital Signature, Digital Signature Algorithm (DSA), Enhanced Adaptive Acknowledgment (AACK) (EAACK), Mobile Ad hoc Network (MANET).
Read More...
Authors:A. PRASANNA LAKSHMI, M. HARATHI
Abstract: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusiondetection mechanisms to protect MANET from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behavior-detection rates in certain circumstances while does not greatly affect the network performances.
Keywords: Digital Signature, Digital Signature Algorithm (DSA), Enhanced Adaptive Acknowledgment (AACK) (EAACK), Mobile Ad hoc Network (MANET).
INTRODUCTION
Due to their natural mobility and scalability, wireless
networks are always preferred since the first day of their
invention. Owing to the improved technology and reduced
costs, wireless networks have gained much more
preferences over wired networks in the past few decades. By
definition, Mobile Ad hoc Network (MANET) is a
collection of mobile nodes equipped with both a wireless
transmitter and a receiver that communicate with each other
via bidirectional wireless links either directly or indirectly.
Industrial remote access and control via wireless networks
are becoming more and more popular these days. One of the
major advantages of wireless networks is its ability to allow
data communication between different parties and still
maintain their mobility. However, this communication is
limited to the range of transmitters. This means that two
nodes cannot communicate with each other when the
distance between the two nodes is beyond the
communication range of their own. MANET solves this
problem by allowing intermediate parties to relay data
transmissions. This is achieved by dividing MANET into
two types of networks, namely, single-hop and Multi-hop.
In a single-hop network, all nodes within the same radio
range communicate directly with each other. On the other
hand, in a multi-hop network, nodes rely on other
intermediate nodes to transmit if the destination node is out
of their radio range. In contrary to the traditional wireless
network, MANET has a decentralized network
infrastructure. MANET does not require a fixed
infrastructure; thus, all nodes are free to move randomly
[11]. MANET is capable of creating a self-configuring and
self-maintaining network without the help of a centralized
infrastructure, which is often infeasible in critical mission
applications like military conflict or emergency recovery.
Minimal configuration and quick deployment make
MANET ready to be used in emergency circumstances
where an infrastructure is unavailable or unfeasible to install
in scenarios like natural or human-induced disasters,
military conflicts, and medical emergency situations.Read More...
No comments:
Post a Comment