Detecting Packet-dropping faults in Mobile ad-hoc networks
نویسندگان
چکیده
Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the “Detection Manager” to locate malicious or faulty nodes that misroute, corrupt or drop packets. The unobtrusive monitoring technique is similar to an intrusion detection system that monitors system activity logs to determine if the system is under attack. This technique uses information from different network layers to detect malicious nodes. The detection manager we are developing for Mobile Ad-hoc networks stores several rules for responding to different situations. Any single node in the network can use unobtrusive monitoring without relying on the cooperation of other nodes, which makes unobtrusive monitoring easy to implement and deploy. Simulations of Mobile Ad-hoc networks that contain malicious nodes indicate that unobtrusive monitoring has a high detection effectiveness with low false positive rate.
منابع مشابه
Detecting Packet Mishandling in Mobile Ad-hoc Networks
Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted or dropped. We propose solutions using an unobtrusive monitoring technique to locate malicious packet dropping. This technique uses information from different network layer...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Biologically-Inspired Type-2 Fuzzy Set Based Algorithm for Detecting Misbehaving Nodes in Ad-Hoc Wireless Networks
Implementation of routing protocols in mobile adhoc networks relies on efficient node cooperation. However, node misbehavior is a common phenomenon, thus, ad-hoc networks are subject to packet dropping, packet modification, packet misrouting, selfish node behavior, and so on. In this paper, a biologically-inspired type-2 fuzzy set recognition algorithm for detecting misbehaving nodes in an ad-h...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کامل