Detection and Isolation of Packet Dropping Attacker in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 4
Abstract
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
Authors and Affiliations
Ahmed Abdalla, Ahmad Almazeed, Imane Saroit, Amira Kotb
Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection...
Development of a Novel Approach to Search Resources in IoT
Internet of Things (IoT) referred to interconnected the world of things like physical devices, cars, sensors, home appliances, actuators and machines embedded with software at any time, any location. The increasing numbe...
A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)
Genetic algorithms have been used extensively in solving complex solution-space search problems. However, certain problems can include multiple sub-problems in which multiple searches through distinct solution-spaces are...
A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix
In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied...
Instant Human Face Attributes Recognition System
The objective of this work is to provide a simple and yet efficient tool for human attributes like gender, age and ethnicity by the human facial image in the real time image as we all aware this term that “Real-Time fram...