IEEEXplore (1) - 2009 Pacific-Asia Conference on...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network Rakesh Shrestha, Jong-Yeop Sung, Sang-Duck Lee, Pyung Sik-Yun, Dong-You Choi* ,Seung-Jo Han Department of Information & Communication Engg., Chosun University, Gwangju, South Korea e-mail : rakez_shre@hotmail.com, shoo2715@nate.com, dandylsd@hanmail.net, kukminco@paran.com, { dychoi ,sjbhan}@chosun.ac.kr Abstract— MANET brings evolution in Wireless mobile Ad hoc network but it has to face many difficulties due to the dynamic network topologies, lack of centralization,, inadequate authentication mechanism, insecure routing and are vulnerable to different types of attacks. Different types of Denial of Service attacks occur in MANET which is one of the major problems. We used AODV routing because it offers quick adaptation to dynamic link conditions, low processing and memory overhead and low network utilization. Moreover secure authentication schemes are used to build a highly secure and available key handling service, which forms the core of our security framework. Keywords- MANET; AODV; authentication; IDS; one way chain I. INTRODUCTION MANET is a self-configuring network of mobile nodes and associated hosts connected by wireless links. A wireless ad-hoc network consists of a collection of “peer” mobile nodes that are capable of communicating with each other without help from a fixed infrastructure. Our IDS model is based on Ad-hoc On-Demand Distance Vector (AODV) routing protocol which is a forwarded routing protocol that provide efficient and low over head protection. The route building process relies heavily on forwarded messages; the malicious node can change the other nodes’ routing table and launch sophisticated routing attacks such as man in the middle attack and DoS attacks by comprehensively manipulating forged contents of forwarded routing messages. The AODV routing protocol uses an on-demand approach for finding routes, i.e a route is established only when it is required by a source node for transmitting data packets. It employs destination sequence numbers to identify the most recent path. It has small size routing messages, which contain only routing information for the source and destination. While a source node S requires a route toward a destination node D, node S broadcasts a RREQ message to request for the route. Upon receiving RREQ, the receiver discards it if it formerly received the same RREQ message; by checking RREQ with the same source address and the same RREQ ID. Otherwise, the receiver stores the reverse route towards the source if RREQ has a higher source sequence number or an equal sequence number than that the receiver had. If the receiver has a valid route toward the *Corresponding author destination D or the receiver itself is the destination D, it will generate a RREP message and unicast reply along the reverse route toward the source S. After a route has been established between S and D, if one intermediate node N1 notices that it cannot reach another node N2 which was
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

IEEEXplore (1) - 2009 Pacific-Asia Conference on...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online