Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol

Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol

Deepak Kumar Verma, Ashwani Kush, Renu Jain
Copyright: © 2020 |Pages: 14
DOI: 10.4018/IJITPM.2020100104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Mobile ad hoc networks are characterized by wireless medium used for communication, frequent change of topology, and non-availability of centralized control for authentication. Out of all the attributes, communication through open air poses the biggest threat to security. Absence of security implementations by the routing protocols gives opening for intrusion to malicious nodes which then operate various attacks to hinder the normal communication. Solution suggested modifies vastly used AODV protocol to exploit the unused reserved bits of RREP message for identifying the malicious nodes in the MANET. Proposed algorithm finds the neighbors of the destination through RREQ messages, identifies vindictive neighbors providing contrived DSNs of the destination.
Article Preview
Top

The vast range of vulnerabilities exhibited by MANETS due to their inherent nature of communication restricts a single solution for all kinds of attacks. Researchers have proposed solutions that are either specific for a particular attack or specific to a category of attack.

Huang et al., (2003) work is based on anomaly detection mechanism, authors have proposed cluster based approach wherein cluster head collects information from neighboring nodes. Authors have extended their previous work which was based on learning approach considering various features. Here authors have proposed a protocol for formation of clusters, selection of cluster head and cluster recovery. Data related to features under consideration is recorded by nodes and transmitted to cluster head. Cluster head also collects data as it works in promiscuous mode, thereafter cluster head applies the IDS functions and tells the nodes about how the feature computation is to be done. Authors have done simulations using NS2 and Mobiemu simulator considering AODV protocol. Experimentation has been done for attacks like blackhole, sleep deprivation, selfishness, DOS etc. authors have shown that their proposed scheme is better than other existing schemes.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing