ferry based IDSad hoc - A Ferry-based Intrusion Detection...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey204, [email protected] Department of Computer Science & Engineering Lehigh University Bethlehem, PA 18015 Abstract — Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. In addition, new history based routing schemes e.g. Prophet have been proposed because traditional adhoc routing schemes do not work well in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM) scheme for sparsely connected ad hoc networks that use Prophet as their routing scheme. Via simulations, we study the effectiveness of the FBIDM scheme when malicious nodes launch selective data dropping attacks. Our results with different mobility models, ferry speed, traffic load scenarios indicate that the FBIDM scheme is promising in reducing the impact of such malicious attacks. Keywords-intrusion detection, routing, prophet, DoS resilience, sparsely connected adhoc networks, disruption tolerant networkst. I. INTRODUCTION An ad hoc wireless network is a self-organizing network consisting of mobile nodes that are connected via wireless links where nodes not in direct range can communicate through intermediate nodes. On demand routing protocols e.g. [1],[2],[3] are commonly used in ad hoc wireless networks to establish the routing paths between a source-destination pair. However, there are scenarios where the ad hoc networks can be sparsely connected e.g. in battlefield scenarios, in vehicular ad hoc networks. Traditional adhoc routing protocols do not work well in such environments. Thus, recently new stored-and-forward architecture has been proposed to deal with such challenging network environments and new routing schemes [12], [15],[18],[19] have been proposed for such sparsely connected adhoc networks. Security is critical in military ad-hoc networks since a disruption could cause lives. Thus, both control (e.g. route discovery) and topology update messages need to be authenticated and data packets need to be encrypted. Many proposals have been made in securing adhoc routing protocols e.g. [4],[5],[6]. For example, Adriane [6] uses a variant of Telsa[8] to provide source authentication for DSR while SEAD [5] uses one-way hash chains to provide efficient secure solutions for DSDV [7]. All the above approaches attempt to provide secured communications in mobile ad hoc networks. However, in a chaotic battlefield environment, authenticated devices are very likely to be captured by the enemy....
View Full Document

This note was uploaded on 03/19/2012 for the course COMPUTER S 2143 taught by Professor Singh during the Spring '12 term at Punjab Engineering College.

Page1 / 8

ferry based IDSad hoc - A Ferry-based Intrusion Detection...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online