Detection and Isolation of Packet Dropping Attacker in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 4
Abstract
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
Authors and Affiliations
Ahmed Abdalla, Ahmad Almazeed, Imane Saroit, Amira Kotb
Deep CNN-based Features for Hand-Drawn Sketch Recognition via Transfer Learning Approach
Image-based object recognition is a well-studied topic in the field of computer vision. Features extraction for hand-drawn sketch recognition and retrieval become increasingly popular among the computer vision researcher...
Efficient Gabor-Based Recognition for Handwritten Arabic-Indic Digits
In daily life, the need of automatically digitizing paper documentations and recognizing textual images is still present with existing and potential upcoming rooms for improvements, especially for languages like Arabic,...
Internet Forensics Framework Based-on Clustering
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators...
An autonomous intelligent gateway for wireless sensor network based on mobile node
One of the recent tendencies for Wireless Sensor Networks (WSNs) that significantly increases their performance and functionality is the utilization of mobile nodes. This paper describes the software architecture of an i...
Clone Detection Using DIFF Algorithm For Aspect Mining
Aspect mining is a reverse engineering process that aims at mining legacy systems to discover crosscutting concerns to be refactored into aspects. This process improves system reusability and maintainability. But, locati...