Watchdog and Pathrater based Intrusion Detection System for MANET
Title | Watchdog and Pathrater based Intrusion Detection System for MANET |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Saifuddin, K. M., Ali, A. J. B., Ahmed, A. S., Alam, S. S., Ahmad, A. S. |
Conference Name | 2018 4th International Conference on Electrical Engineering and Information Communication Technology (iCEEiCT) |
Keywords | Ad-hoc On-demand Distance Vector, AODV routing protocol, broad distribution, composability, computer network security, dynamic source routing, effective intrusion detection system, fake route, intrusion detection system, malicious nodes, MANET, MANET Attack Detection, Metrics, mobile ad hoc network, mobile ad hoc networks, mobile radio, Network topology, open nodes, pathrater, pathrater method, Peer-to-peer computing, pubcrawl, Resiliency, Routing, Routing protocols, routing table, security, security of data, Sinkhole attack, telecommunication security, unwanted malicious attacks, Watchdog, watchdog method |
Abstract | Mobile Ad Hoc Network (MANET) is pretty vulnerable to attacks because of its broad distribution and open nodes. Hence, an effective Intrusion Detection System (IDS) is vital in MANET to deter unwanted malicious attacks. An IDS has been proposed in this paper based on watchdog and pathrater method as well as evaluation of its performance has been presented using Dynamic Source Routing (DSR) and Ad-hoc On-demand Distance Vector (AODV) routing protocols with and without considering the effect of the sinkhole attack. The results obtained justify that the proposed IDS is capable of detecting suspicious activities and identifying the malicious nodes. Moreover, it replaces the fake route with a real one in the routing table in order to mitigate the security risks. The performance appraisal also suggests that the AODV protocol has a capacity of sending more packets than DSR and yields more throughput. |
URL | https://ieeexplore.ieee.org/document/8628117 |
DOI | 10.1109/CEEICT.2018.8628117 |
Citation Key | saifuddin_watchdog_2018 |
- routing table
- open nodes
- pathrater
- pathrater method
- Peer-to-peer computing
- pubcrawl
- Resiliency
- Routing
- Routing protocols
- network topology
- security
- security of data
- Sinkhole attack
- telecommunication security
- unwanted malicious attacks
- Watchdog
- watchdog method
- Ad-hoc On-demand Distance Vector
- mobile radio
- mobile ad hoc networks
- mobile ad hoc network
- Metrics
- MANET Attack Detection
- MANET
- malicious nodes
- intrusion detection system
- fake route
- effective intrusion detection system
- dynamic source routing
- computer network security
- composability
- broad distribution
- AODV routing protocol