TITLE

An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks

AUTHOR(S)
PING YI; TING ZHU; JIANQING MA; YUE WU
PUB. DATE
March 2013
SOURCE
Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p269
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Mobile ad hoc networks (MANETs) are vulnerable to attacks with dynamic change of topology and unreliable wireless communication. Intrusion detection systems (IDSs) are important in MANETs to effectively identify an intruder. Then, IDS may broadcast the blacklist to all nodes in network. This method is simple but it may exhaust communication bandwidth and node resource, especially when there are a large number of nodes in network, In the paper, we develop an intrusion prevention mechanism in MANETs called mobile firewall. It can isolate an intruder with less overhead, and it can track the intruder to continually prevent the attack. We analyze the overhead cost of the mobile firewall and compare it with the flooding broadcast method. Simulations show our method can prevent invader effectively and communication overhead is less.
ACCESSION #
86414697

 

Related Articles

  • Topology Management based Energy balancing Model for IPS in MANET using MEC Clustering Algorithm. Parameswaran, T.; Palanisamy, C.; Madheswari, K. // International Journal of Computer Applications;6/15/2012, Vol. 48, p37 

    In Mobile Ad-hoc Networks, the topology management is a crucial factor that plays a vital role to maintain the node cooperation and stability of the network in unpredicted movements of the nodes. Moreover, the resource consumption imposes problem with mobile nodes due to the variations of...

  • An Approach for DDoS Attack Prevention in Mobile ad hoc Networks. Timcenko, V. V. // Electronics & Electrical Engineering;2014, Vol. 20 Issue 6, p150 

    In this paper we propose a prevention mechanism for distributed denial of service (DDoS) attacks in Mobile Ad hoc Networks (MANET) environment. Since MANETs are wireless, self-configuring networks with highly unpredictable node movement, the security provisioning represents one of the most...

  • LAAP: A Learning Automata-based Adaptive Polling Scheme for Clustered Wireless Ad-Hoc Networks. Torkestani, Javad // Wireless Personal Communications;Mar2013, Vol. 69 Issue 2, p841 

    In multi-hop ad hoc networks, besides collision-free transmissions, channel utilization should be also enhanced due to the scarce bandwidth. In this paper, we propose a learning automat-based adaptive polling scheme for medium access scheduling in clustered wireless ad-hoc networks to enhance...

  • A Survey on VANET Intrusion Detection Systems. ERRITALI, Mohammed; Ouahidi, Bouabid El // International Journal of Engineering & Technology (0975-4024);Apr/May2013, Vol. 5 Issue 2, p1985 

    In recent years, the security issues on Vehicular ad hoc networks (VANETs) have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security...

  • Unwanted Activity Detection System in Wireless Network. Deshmukh, Sneha A.; Rajput, Monika // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1564 

    This paper present how the security can be given to the wireless network with the help of intrusion detection system and firewalls. With the rapid growth of application of Internet in various walks of life, the study of Security has become inevitable. Wireless networks are providing tremendous...

  • SIMULATION AND PERFORMANCE ANALYSIS OF DISTRIBUTED COOPERATIVE TRUST BASED INTRUSION DETECTION FRAMEWORK FOR MANETs. MUTLU, Süreyya; YILMAZ, Güray // Journal of Aeronautics & Space Technologies / Havacilik ve Uzay ;Jul2013, Vol. 6 Issue 2, p49 

    Mobile Ad Hoc Network (MANET) is a collection of nodes, which form an infastructureless topology. There is no central access point or centralized management. Intrusion detection in MANETs, however, is challenging for a number of reasons. This paper introduces intrusion detection architecture for...

  • EVALUATING AND COMPARISON OF INTRUSION IN MOBILE AD HOC NETWORKS. Hicham, Zougagh; Ahmed, Toumanari; Rachid, Latif; Noureddin, Idboufker // International Journal of Distributed & Parallel Systems;Mar2012, Vol. 3 Issue 2, p243 

    In recent years, the use of mobile ad hoc network (MANETs) has been widespread in many applications. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard to achieve because of its fundamental...

  • An Approach to Combat the Blackhole Attack in AODV Routing Protocol. Pal, Rohit; Azad, Mukesh; Kumar, Santosh // International Journal of Computer Applications;Sep2013, Vol. 77, p13 

    This article consists of a brief description of various issues on security of Ad hoc networks as well as counter work against Black Hole Attack. A Combat Approach against Black Hole Attack is truly based on Cooperation of individual nodes of MANET. In this Approach each individual node act as...

  • Comparative study of Distributed Intrusion Detection in Ad-hoc Networks.  // International Journal of Computer Applications;Oct2010, Vol. 8, p11 

    The article presents a study on distributed intrusion detection in Ad-hoc networks (AHNs). The researchers have examined the characteristics of ad hoc network in the aspects of security and challenges or attacks in an existing intrusion detection system. The study justifies the importance of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics