Enhanced intrusion detection techniques for mobile ad hoc networks
Enhanced intrusion detection techniques for mobile ad hoc networks
- Author(s): L.P. Rajeswari ; R.A.X. Annie ; A. Kannan
- DOI: 10.1049/ic:20070757
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): L.P. Rajeswari ; R.A.X. Annie ; A. Kannan Source: IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), 2007 p. 1008 – 1013
- Conference: IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007)
- DOI: 10.1049/ic:20070757
- ISBN: 978 0 86341 937 9
- Location: Tamil Nadu, India
- Conference date: 20-22 Dec. 2007
- Format: PDF
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. In this paper we propose an enhancement on intrusion detection systems for ad hoc networks (EIDAN) based on a novel architecture that uses intrusion detection techniques to detect active attacks that an adversary can perform against routing fabric of mobile ad hoc networks. Moreover, the system has been designed to take countermeasures to attacks. The novelties of the system enable the detection of active attacks. The enhancement of intrusion detection system for ad hoc network (EIDAN) system does not introduce any changes to the underlying routing protocol and operates as an intermediate component between the network traffic and the routing protocol. The system was developed and tested to operate in ad hoc on demand distance vector routing (AODV) enabled networks using the network simulator (ns-2). This system has been designed to detect resource consumption attack, packet-dropping attack and fabrication attacks.
Inspec keywords: mobile radio; telecommunication security; ad hoc networks; telecommunication network topology; routing protocols
Subjects: Mobile radio systems; Protocols; Communication network design, planning and routing
Related content
content/conferences/10.1049/ic_20070757
pub_keyword,iet_inspecKeyword,pub_concept
6
6