Detection and Isolation of Packet Dropping Attacker in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 4
Abstract
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
Authors and Affiliations
Ahmed Abdalla, Ahmad Almazeed, Imane Saroit, Amira Kotb
High Lightweight Encryption Standard (HLES) as an Improvement of 512-Bit AES for Secure Multimedia
In today’s scenario, people share information to another people frequently using network. Due to this, more amount of information are so much private but some are less private. Therefore, the attackers or the hackers tak...
Behavior of the Minimum Euclidean Distance Optimization Precoders with Soft Maximum Likelihood Detector for High Data Rate MIMO Transmission
The linear closed loop Multiple-input Multiple-output (CL-MIMO) precoding techniques characterized by the channel state information knowledge (CSI), at both sides of the link, aims to improve information throughput and r...
Creating and Protecting Password: A User Intention
Students Academic Information System (SAIS) is an application that provides academic information for the students. The security policy applied by our university requires the students to renew their SAIS password based on...
Conception of a management tool of Technology Enhanced Learning Environments
This paper describes the process of the conception of a software tool of TELE management. The proposed management tool combines information from two sources: i) the automatic reports produced by the Learning Content Mana...
Circular Calibration of Depth Extraction in Stereo Configuration
Lens distortion is defined as departure from rectilinear projection of an imaging system which affects the accuracy of almost all vision applications. This work addresses the problem of distortion with investigating the...