Skip to main content

2018 | OriginalPaper | Buchkapitel

A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET

verfasst von : Biswaraj Sen, Moirangthem Goldie Meitei, Kalpana Sharma, Mrinal Kanti Ghose, Sanku Sinha

Erschienen in: Advanced Computational and Communication Paradigms

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

MANETs (Mobile Ad hoc Networks) are wireless networks that are deployed for a particular purpose or short-term use. Because of the lack of central coordination, MANETs share an inherent trust relationship among the nodes forming the network. Each node implicitly trusts its neighbour to forward packets in the network till the packets reach their destination. Further, each node in a MANET can monitor its neighbours by keeping track of the packets passing through the neighbours. This characteristic ability of a node in MANET makes it possible to develop a trust model that can correlate with the innate trust shared among the nodes. This paper looks at developing such a trust model which is applied to all the nodes in the network. The trust model works like an Intrusion Detection System (IDS), which seeks to detect blackhole attacks in the system, and then identify and mitigate the malicious attacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40(10), 70–75 (2002)CrossRef Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40(10), 70–75 (2002)CrossRef
2.
Zurück zum Zitat Chandra, P.: Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security. Elsevier (2011) Chandra, P.: Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security. Elsevier (2011)
3.
Zurück zum Zitat Murthy, C.S.R., Manoj, B.S.: Ad hoc Wireless Networks: Architectures and Protocols, Portable Documents. Pearson education (2004) Murthy, C.S.R., Manoj, B.S.: Ad hoc Wireless Networks: Architectures and Protocols, Portable Documents. Pearson education (2004)
4.
Zurück zum Zitat Güneş, M., Juraschek, F., Blywis, B., Mushtaq, Q., Schiller, J.: A testbed for next generation wireless network research. PIK-Praxis der Informationsverarbeitung und Kommunikation 32(4), 208–212 (2009)CrossRef Güneş, M., Juraschek, F., Blywis, B., Mushtaq, Q., Schiller, J.: A testbed for next generation wireless network research. PIK-Praxis der Informationsverarbeitung und Kommunikation 32(4), 208–212 (2009)CrossRef
5.
Zurück zum Zitat Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9(5), 545–556 (2003)CrossRef Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9(5), 545–556 (2003)CrossRef
6.
Zurück zum Zitat Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRef Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRef
7.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., and Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless network security (pp. 103–135). Springer US (2007) Wu, B., Chen, J., Wu, J., and Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless network security (pp. 103–135). Springer US (2007)
8.
Zurück zum Zitat Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mob. Netw. Appl. 17(3), 342–352 (2012)CrossRef Li, W., Parker, J., Joshi, A.: Security through collaboration and trust in manets. Mob. Netw. Appl. 17(3), 342–352 (2012)CrossRef
9.
Zurück zum Zitat Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef
10.
Zurück zum Zitat Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless Network Security, pp. 159–180. Springer US (2007) Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless Network Security, pp. 159–180. Springer US (2007)
11.
Zurück zum Zitat Nishani, L., Biba, M.: Machine learning for intrusion detection in MANET: a state-of-the-art survey. J. Intell. Inf. Syst. 46(2), 391–407 (2016)CrossRef Nishani, L., Biba, M.: Machine learning for intrusion detection in MANET: a state-of-the-art survey. J. Intell. Inf. Syst. 46(2), 391–407 (2016)CrossRef
12.
Zurück zum Zitat Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 14(5), 85–91 (2007)CrossRef Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 14(5), 85–91 (2007)CrossRef
13.
Zurück zum Zitat Huang, Y.A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 135–147. ACM (2003) Huang, Y.A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 135–147. ACM (2003)
14.
Zurück zum Zitat Huang, Y.A., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting ad-hoc routing anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, pp. 478–487. IEEE (2003) Huang, Y.A., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting ad-hoc routing anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, pp. 478–487. IEEE (2003)
15.
Zurück zum Zitat Trivedi, A.K., Kapoor, R., Arora, R., Sanyal, S., Sanyal, S.: RISM–Reputation Based Intrusion Detection System for Mobile Ad hoc Networks (2013). arXiv:1307.7833 Trivedi, A.K., Kapoor, R., Arora, R., Sanyal, S., Sanyal, S.: RISM–Reputation Based Intrusion Detection System for Mobile Ad hoc Networks (2013). arXiv:​1307.​7833
16.
Zurück zum Zitat Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, pp. 226–236. ACM (2002) Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, pp. 226–236. ACM (2002)
17.
Zurück zum Zitat Nadeem, A., Howarth, M.P.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)CrossRef Nadeem, A., Howarth, M.P.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)CrossRef
18.
Zurück zum Zitat Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 30–40. ACM (2003) Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 30–40. ACM (2003)
19.
Zurück zum Zitat Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. J. Supercomput. 64(3), 777–804 (2013)CrossRef Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. J. Supercomput. 64(3), 777–804 (2013)CrossRef
Metadaten
Titel
A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET
verfasst von
Biswaraj Sen
Moirangthem Goldie Meitei
Kalpana Sharma
Mrinal Kanti Ghose
Sanku Sinha
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_74

Neuer Inhalt