Detection of Jamming Attacks in Mobile Ad Hoc Networks Using Statistical Process Control

نویسندگان

  • Mohammed-Alamine El Houssaini
  • Abdessadek Aaroud
  • Ali El Hore
  • Jalel Ben-Othman
چکیده

A mobile Ad Hoc network (MANET) may be a wireless network that doesn't take any fixed infrastructure (such as routing services, such as access points and wired networks), and whose nodes should cooperate among themselves to view characteristic and routing. The standard manner of secure networks isn't directly suitable to MANETs. intrusion detection systems (IDSs), that monitor system services and determine intrusions, are generally accustomed complement alternative security techniques.. In this paper, we tend to inquire the employment of evolutionary computation mechanisms for synthesizing intrusion detection programs on MANETs. We incline to develop programs to determine the later attacks against MANETs: power consumption attack and dropping attacks. The designed system may be a new design that utilizes knowledge-based intrusion determining mechanisms to find the attacks that an adversary will perform against the routing cloth of mobile networks. Mobile unexpected Networks (MANETs) are susceptible to several node misbehaviors attributable to their different options i.e. highly dynamic configuration, rigorous power restraints and error-vulnerable transmission media. Significant analysis attempts have been performed to cover the matter of misbehavior detection. Since, very little analysis work has been performed to differentiate really harmful behaviors from the faulty behaviors. During this paper, we introduce and formulate a policy-based malicious peer detection technique, within which related data, like buffer sending, communication channel standing and transmission power level, is gathered so wont to ensure whether or not the misbehavior is likely a results of harmful activity or not. Simulation results indicate that the policy-based malicious peer detection technique is capable to differentiate attacking peers from faulty peers with high confidence. Furthermore, the technique converges to an even view of harmful nodes amongst all the nodes with a limited communication overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016