Preemptive Routing & Intrusion Detection for MANETs

نویسندگان

  • N. Sandeep Chaitanya
  • Vijaya Kumar
  • Ravi Kumar
چکیده

An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper we will extend the definition of AODV with the ability to discover multiple routes to a host and switch between them, if an active route is becoming weak and there is a risk that it will disappear. We will refer to it as "pre-emptive AOMDV". We will show that the performance of pre-emptive AOMDV do handle changes in topology better than AODV it self. To show the effect of extending AODV, the suggested protocol is implemented in a simulator. Performance enhancements will be presented from different scenarios, to compare pre-emptive AOMDV with the ordinary AODV. In this paper we also focus on intrusion detection based on Finite State Machine and cache memory in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packets and changes in the incoming packets which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement in comparison with others, we simulated our methods by NS2 software.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks Distributed Intrusion Detection Models for Mobile Ad Hoc Networks

A mobile ad hoc Network (MANET) is a mobile mesh network in which mobile wireless nodes are both hosts and routers so they can communicate without base stations. Because of this cooperative routing capability, MANETs have envisioned for military and emergency communication, but become more vulnerable to routing attacks than wired networks. If a malicious node propagates forged routing informati...

متن کامل

Detection of Routing Anomaly using IDS Architecture based on Agents and Clusters in MANETs

In recent years, the security issues on MANET have become one of the primary concerns. MANETs rely on the cooperation of the nodes participating in the network to forward packets for each other. Therefore, MANET routing protocols are more vulnerable than routing protocols in wired networks. Because of unique features of MANETs, existing security mechanisms, especially Intrusion Detection System...

متن کامل

Secure Improved Location Aided Cluster Based Routing Protocol in MANETs

MANET is a network of mobile nodes that interconnect, interact with and collaborate with each other. Security is the main challenge for MANETs. Many attempts were made to secure a cluster based routing protocol, but due to lack of fixed infrastructure and central management, the security solution is challenging research. Intrusion detection System is one of the key technique and best solution t...

متن کامل

QAIDS: Quantitative and Agent based Intrusion Detection System

Intrusion Detection Systems (IDSs) for Mobile Ad hoc Networks (MANETs) are necessary when we deploy MANETs in reality. In this paper, we focus on the protection of MANET routing protocols. Therefore, we present a new intrusion detection architecture based on quantitative, agents, and clusters that is suitable for multi-hop mobile ad hoc networks. It detects nodes misbehavior and anomalies in pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012