ferry based IDSad hoc - A Ferry-based Intrusion Detection...

Info icon This preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey204, jih206}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University Bethlehem, PA 18015 Abstract — Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. In addition, new history based routing schemes e.g. Prophet have been proposed because traditional adhoc routing schemes do not work well in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM) scheme for sparsely connected ad hoc networks that use Prophet as their routing scheme. Via simulations, we study the effectiveness of the FBIDM scheme when malicious nodes launch selective data dropping attacks. Our results with different mobility models, ferry speed, traffic load scenarios indicate that the FBIDM scheme is promising in reducing the impact of such malicious attacks. Keywords-intrusion detection, routing, prophet, DoS resilience, sparsely connected adhoc networks, disruption tolerant networkst. I. I NTRODUCTION An ad hoc wireless network is a self-organizing network consisting of mobile nodes that are connected via wireless links where nodes not in direct range can communicate through intermediate nodes. On demand routing protocols e.g. [1],[2],[3] are commonly used in ad hoc wireless networks to establish the routing paths between a source-destination pair. However, there are scenarios where the ad hoc networks can be sparsely connected e.g. in battlefield scenarios, in vehicular ad hoc networks. Traditional adhoc routing protocols do not work well in such environments. Thus, recently new stored-and-forward architecture has been proposed to deal with such challenging network environments and new routing schemes [12], [15],[18],[19] have been proposed for such sparsely connected adhoc networks. Security is critical in military ad-hoc networks since a disruption could cause lives. Thus, both control (e.g. route discovery) and topology update messages need to be authenticated and data packets need to be encrypted. Many proposals have been made in securing adhoc routing protocols e.g. [4],[5],[6]. For example, Adriane [6] uses a variant of Telsa[8] to provide source authentication for DSR while SEAD [5] uses one-way hash chains to provide efficient secure solutions for DSDV [7]. All the above approaches attempt to provide secured communications in mobile ad hoc networks. However, in a chaotic battlefield environment, authenticated devices are very likely to be captured by the enemy.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern