SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
DOI:10.5121/jgraphoc.2014.6302 7
SELECTIVE WATCHDOG TECHNIQUE FOR
INTRUSION DETECTION IN MOBILE AD-HOC
NETWORK
DEEPIKA DUA AND ATUL MISHRA
Department of Computer Engineering, YMCA University of Science & Technology,
Haryana, India
ABSTRACT
Mobile ad-hoc networks(MANET) is the collection of mobile nodes which are self organizing and are
connected by wireless links where nodes which are not in the direct range communicate with each other
relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious node can
easily compromise the security of the network. A black-hole node is the malicious node which drops the
entire packet coming to it and always shows the fresh route to the destination, even if the route to
destination doesn't exist. This paper describes a scheme that will detect the intrusion in the network in the
presence of black-hole node and its performance is compared with the previous technique. This novel
technique helps to increase the network performance by reducing the overhead in the network.
KEYWORDS
MANET, Intrusion, Intrusion Detection system, Attacks
1. INTRODUCTION
Mobile ad-hoc network is formed by the collection of some mobile nodes which can act both as a
sender as well as receiver for data communication. They are decentralized networks which are
self organizing and self maintaining. There is no fixed infrastructure in the network, the topology
changes dynamically [1]. As a result of continuously changing topology, there is no fixed
boundary of the network. The nodes cooperate with each other to forward the data packet. In such
a network where there is no well-defined boundary, open medium, nodes rely on one other to
forward the data packet, firewalls cannot be applied for securing these networks. Intrusion
detection system [2] is used in these networks to detect the misbehaviour in the network.
Intrusion detection system acts as a second layer in mobile ad-hoc networks [3]. Intrusion
detection system can be network based [4] or host based [5] on the basis of the audit data
collection or it can be signature based, anomaly based or specification based on the basis of the
detection technique [6].
In this paper, a scheme is proposed which detects the misbehaving nodes in the network in the
presence of black-hole attack [7] [8] and reduces the network overhead.
Rest of the paper is organized as follows. In section 2, literature survey is presented. In section 3,
scheme description is present, the methodology used is described. In section 4, simulation
environment and results of the simulation are presented. And finally conclusion is presented in
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
8
section5.
2. RELATED WORK
Marti el al [9] proposed a scheme named Watchdog which is a reputation based scheme [10], in
which after detecting the malicious node, information is propagated throughout the network so to
avoid that node in future routes.
The watchdog scheme works in two parts-in the first part the watchdog detects the malicious node
by promiscuously listening to its next neighbour’s transmission. If a node doesn't forward the
packet after a threshold, then watchdog declares that node as malicious. And then the path rater
finds the new route to the destination excluding that malicious node. In this scheme malicious
node is detected instead of malicious link there are six weaknesses that are mentioned by Marti
[9]. They are 1)Receiver Collision problem 2)Ambiguous collision 3)Limited Transmission
power 4) False misbehaviour 5) collusion 6) Partial Dropping.
Liu at al [10] proposed a scheme named TWOACK, which detects the misbehaving links in the
ad-hoc network instead of misbehaving nodes. It is an acknowledgement based scheme in which
every third node in the route from sender to receiver requires to send an acknowledgement packet
to the first node down the reverse route.
Figure 1.TWOACK
In figure 1, node Q sends a packet to node R which further forwards it to node S. When node S
receives the packet and as it is third node in the path, it will send a TWOACK packet to the node
Q acknowledging that it receives the packet successfully. All the nodes in the path work in the
similar way.
It solves the receiver collision problem and limited power problem of the watchdog scheme. But
due to the exchange of too many acknowledgement packets, this scheme consumes too much
battery power and hence can degrade the network performance. It works on DSR (Dynamic
source routing) protocol.
Sheltami et al. [11] proposed a scheme named Adaptive acknowledgment (AACK) which is
based on TWOACK scheme. This scheme also works on DSR routing protocol. It is an
advancement of the TWOACK scheme. It reduces the battery consumption by making the scheme
a combination of end-to-end acknowledgement and TACK, which is similar to TWOACK. When
the sender sends a data packet to destination, it waits for some time for the destination to
acknowledge that data packet, but if the acknowledgement doesn't come within per-defined time,
then it switches to TACK mode, where every third node sends the TACK packet to the nodes two
hops away from it down the route.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
9
Figure 2: ACK scheme
Figure 2 shows the ack scheme in which source P waits for the destination T to acknowledge the
data packet. If acknowledgment from T doesn’t receive within specified time, then it switches to
TACK mode by sending TACK packet.
Nidal Nasser and Yunfeng Chen [12] proposed an approach called Ex-Watchdog. It was basically
an improvement over the Watchdog scheme proposed by Marti [9].Out of the six weaknesses
mentioned in the Watchdog [9] scheme it solves the false misbehaviour problem. In this scheme,
each node maintains a table having entries of source address, destination address, and the
statistics of the packets received, forwarded and stored. If any node reports a node as being
misbehaving, then instead of trusting that node immediately, a new route to destination is found
excluding the reported malicious node and number of packets received is checked at the
destination node. If it is equal to the number of packets sent, then it is a false misbehaviour report
and whosoever generated is declared as malicious .Then, pathrater or routeguard cooperated with
the routing protocol and update the rating of node in their corresponding tables. This scheme fails
to detect the misbehaviour when the misbehaving node is in all the routes from source to
destination.
Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami [13] proposed an approach called EAACK
(Enhanced AACK) which solves receiver collisions problem, limited battery problem and false
misbehaviour problem of the watchdog scheme. It is also an acknowledgement based scheme and
to protect the acknowledgement packet from forging, this scheme makes use of digital signature.
It is composed of three parts:-
ACK- It is an end-to-end acknowledgement as described in AACK scheme. Sender waits for the
destination to acknowledge data packets but if the acknowledgement doesn't come within a
specified time, then it switches to S-ACK mode.
S-ACK- In this mode, similar to TWOACK scheme, consecutive node works in a group i.e. every
third node sends an S-ACK packet to its first node which is in the reverse directions. The
difference between the S-ACK and TWOACK is that TWOACK immediately trusts the
misbehaviour report and declares the node as malicious. But in this scheme, we switch to MRA
mode to confirm the misbehaviour report.
MRA- It stands for misbehaviour report authentication. This mode cooperates with the routing
protocol to find a new route to the destination which excludes the reported misbehaviour node.
Destination is checked for the data packet using the new route. If the data packet is found at the
destination, then it is a false misbehaviour report and the node which generated this report will be
declared as malicious, else the misbehaviour report is trusted and the node would be declared as
misbehaving.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
10
3. PROPOSED APPROACH
We proposed an algorithm that detects the intrusion in the presence of black hole node in the
network. The proposed technique is an improvement over the Watchdog technique[9].In
Watchdog each node continuously hears its next node transmission but in the proposed selective
Watchdog technique only when the acknowledgment would not be received ,then IDS would
start.Morever,in watchdog[9] technique all nodes monitor their neighbours but in proposed
selective watchdog technique ,network of nodes are divided into clusters and only nodes in the
cluster which have value greater than threshold monitor their neighbours. The pseudo code for the
black-hole attack is shown in the algorithm. The input parameters for the algorithm are set of all
the nodes, a threshold value which gets updated dynamically, source node, destination node and
all the nodes which send the route reply to the source node.
The algorithm works as follows:-
The source waits for the destination to send acknowledgement to it after every 10th
packet. If
source receives the acknowledgement, then there is no misbehaviour in the network and process
continues as such. But if the destination fails to acknowledge the data packets for a time period,
then IDS starts its functionality.
As in black-hole attack, there is a greater possibility that black-hole node will send the highest
sequence number to the source in route reply. The proposed IDS algorithm maintains the list of
all the nodes which send the route reply to the source with sequence number greater than the
threshold value.
The IDS will be applied only on those nodes which are in the list maintained by ids.
Algorithm 1: Algorithm for detecting IDS
Input: Threshold_seq_no. Set_of_all_nodes; Set_of_nodes_who_sent_route_reply; source;
destination.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
11
1. Begin
2. If(pkt_received_by_dest==pkt_sent_by_source) then
3. network does not shows any malicious behaviour
4. Else if(pkt_received_by_dest < certain percentage of pkt sent by source over the network)
5. {
6. Then the network shows malicious behaviour and IDS is applied to detect malicious behaviour
7. For(int i=0; i<no._of_nodes_who_sent_route_reply; i++)
8. {
9. If(seq_no[route_reply[Node]] > Threshold_seq_no) then
10. List. add(next[Node])
11. List. add(Node)
12. List. add(prev[Node])
13. result= Segment_watchdog(List);
14. If(result==true) then //(i.e. if malicious node is found)
15. Exit;
16. ENDIF
17. Else
18. Continue
19. EndElse
20. }
21. }
Algorithm: Segmented_Watchdog (List)
1. BEGIN
2. Result=false
3. malicious= Null
4. Node1= list. get(0)
5. Node2= list. get(1)
6. Node3=list. get(2)
7. //Chk(Sent_pkt[Node2]);
8. If(sent_pkt[Node2] == Received_pkt_by_node2) THEN
9. Monitor Node3
10. ENDIF
11. If(Sent_pkt_by_Node3==Received_pkt_by_Node3) THEN
12. No malicious activity detected in this segment
13. RETURN Result
14. END IF
15. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN
16. Malicious= Node1
17. Result= True
18. RETURN Result
19. END ELSEIF
20. Else if(Sent_pkt_by_Node2 < Received_pkt_by_Node2) THEN
21. Malicious= Node2
22. Result=True
23. RETURN Result
24. END ELSEIF
25. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN
26. Malicious= Node1
27. Result=True
28. RETURN Result
29. END ELSEIF
30. END
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
12
For every node in the list, segment watchdog method gets called. In this method, the number of
packets send and received by the node is checked. If number of send and received are equal, then
its successor node in the route is checked else its predecessor node in the route is evaluated in the
same way.
The Flowchart of the technique is shown in figure3
Figure 3(a). Flowchart of proposed technique
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
13
Figure 3(b). Flowchart of selective Watchdog
4. SIMULATION RESULTS
4.1. Assumptions
• We have assumed the bi-directionality in the links.
• Secondly, we have assumed that both the sender and receiver are trusted nodes, i.e. they
are non-malicious.
• Duplicate MAC address doesn't exist.
• Lastly we have assumed that the nodes can overhear the transmission of their immediate
neighbours.
4.2. Simulation Configuration
The Simulation is carried out using the tool Network Simulator 2 (NS-2) version 2.35 on Linux
operating system Ubuntu version 12.10.The system runs on a laptop with Core 2 Duo T6500
processor with 4-GB RAM. For plotting graph, trace-graph version 202 is used.
• Grid Size: 500x500
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
14
• Number of Nodes: 10 of which 5 were communicating
• Packet traffic: CBR (Constant bit rate) on UDP
• Packet Size: 512B
• Packet Interval: 0.25
• Routing Protocol: AODV
4.3. Simulation Scenarios
To simulate our result we have taken two scenarios.
Scenario 1: In this scenario, Watchdog technique is implemented with one malicious node in path
between source and destination.
Scenario 2: In this, Proposed Technique is implemented with same parameters taken in scenario
1.
4.4. Performance Evaluation
Scenario 1
In the first case, watchdog technique is implemented with a malicious node between the source
and destination. Figure 4 shows the results that it detects the misbehaviour in the network of 10
nodes in 27.39 sec of neighbour detection.
Figure 4: Screenshot of Watchdog Technique
Scenario 2
In this scenario, proposed Selective Watchdog technique is implemented and then results are
compared with the results of scenario 1.
Figure 5 show that it took 27.36 sec for our scheme to detect the intrusion in the network.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
15
Figure 5: Screenshot of proposed technique
Figure 6 shows the graph of comparison between the proposed scheme and the watchdog scheme.
From the graph, it is clearly shown that the proposed scheme performs better than the watchdog
scheme in terms of detection time to detect the intrusion in the network.
Figure6 Detection Time Comparison of proposed scheme and watchdog scheme
• Quantitative Analysis
For a network of n nodes, Watchdog scheme have n-2 promiscuous listening. As every node have
to monitor its next neighbour except the source which is not monitored by any node and the
destination which will not monitor any node?
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
16
For our proposed Selective Watchdog scheme, each cluster is of size say l, suppose we break the
network of n nodes into K number of Clusters where K<<n i.e. n/l.
Let say a threshold value of T qualifies n/l*1/t, where t is a qualifier and its value will determine
the number of clusters to be checked.
Promiscuous listening in a cluster of size l would be (l-2) in case both source and destination are
included in the cluster and it would be l in other cases.
Total promiscuous listening in proposed study is l*(nl-2) + 2*(l-2)
This formula calculates the number of promiscuous listening and it is for only one data packet.
Varying the number of cluster size and number of nodes taken, we can get different number of
promiscuous listening.
Table 1 shows the different values taken using the above formula. For n=12,l=3,the number of
promiscuous listening in Watchdog technique is 10 and in proposed technique is 8.Similarly,for
other values shown in table , number of promiscuous listening is calculated.
Table 1. Promiscuous listening with varying number of nodes and cluster size
N=12 N=24 N=36
L=3 8 20 32
L=4 7 16 25
L=6 8 14 20
Watchdog
Technique
10 22 34
Figure 7 shows the graph for number of promiscuous listening for the proposed approach and the
watchdog technique, plotted using the data provided in the table 1. The graph is plotted by
varying the number of nodes and the size of cluster taken for each case.
Figure 7 Number of nodes Vs Promiscuous Listening for proposed scheme
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
17
• Experimental Analysis
Number of nodes and size of cluster is varied and values are calculated by simulation. Table 2
shows the result of simulation.
Table 2. Experimental value of promiscuous listening
N
12
N
24
N
36
L=3 238 580 900
L=4 234 536 779
L=6 220 448 589
Watchdog
Technique
1109 2230 3689
From these values, the graph is plotted. Figure 8 show the graph plotted using the above values.
Figure 8 Number of nodes vs. Promiscuous listening
Table 3 shows the statistics of the number of packets sent, number of packets received and
percentage of packets received and drop in all three scenarios i.e. in absence of malicious node, in
its presence without IDS and with IDS. The statistics shows that with the presence of IDS in the
network, the network performance gets improved.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
18
Table 3: Statistics of simulation data
5. CONCLUSION
Security is the major concern in the ad-hoc networks as nodes can be easily captured or
compromised. Black-hole attack drops all the packets going through the malicious node. As a
result network performance decrease drastically. The proposed scheme detects the intrusion in the
presence of black-hole attack in the network and then routes the packets through secured path.
The results obtained in various test scenarios suggest that proposed selective technique is better
than conventional Watchdog technique in terms of time to detect the intrusion and number of
promiscuous listening amongst the neighbours. The threshold reference removes many
promiscuous listening as a big set of node lying under the value are not subjected to any detection
related messages listening and associated networking cost. The graphs further show that making
the cluster and starting the IDS only when acknowledgement not received further improves the
network throughput as there would be further less network overhead. The proposed technique
scales well with the increase in network size as shown in result graphs. A mathematical model
capturing the costs discussed in the paper has been presented with results matching the
experimental data.
REFERENCES
[1] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in
Wireless/Mobile Security. New York: Springer-Verlag, 2008
[2] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system
,”, Journal of computer security,1999,pp.37-71.
[3] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ.,
College Station, TX, 2004.
[4] David Wagner and Paolo Soto ,”Mimicry Attacks on Host-Based Intrusion Detection Systems”,in
ACM, Nov.2002
[5] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection
system,”, Journal of computer security,1999,pp.37-71.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
(GRAPH-HOC) Vol.6, No.3, September 2014
19
[6] D. Sterne1, P. Balasubramanyam2, D. Carman1, B. Wilson1,R. Talpade3, C. Ko1,R. Balupari1, C-Y.
Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 "A General Cooperative Intrusion Detection
Architecture for MANETs.
[7] Arun Kumar. R, Abhishek M. K et.al. ,”A Review on Intrusion Detection Systems in MANET,”,in
International Journal of Engineering Science and Innovative Technology,vol.2,pp 609-618,March
2013
[8] Deepika Dua and Atul Mishra , “Intrusion Detection in Mobile Ad-hoc Network, “ in International
Journal of Advanced Research in Computer and Communication Engg. ,vol.2,no.2,pp.5691-5694.
[9] S. Marti, T.J.Giuli, K.Lai, and M.Baker,”Mitigating routing misbehavior in mobile ad hoc
networks,”in Proc. 6Th Annu.Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp.255-265.
[10] K.Liu, J.Deng, P.K.Varshney, and K.Balakrishnan , “An acknowledgment-based approach for the
detection of routing misbehaviour in MANETs,”IEEE Trans Mobile Comput.,vol.6,no.5,pp.536-550
,May 2007
[11] T.Sheltami et al. “AACK:Adaptive Acknowledgment Intrusion Detection for Manet with Node
detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information
Networking and Applications,2010,pp 634-640
[12] N.Nasser and Y.Chen,”Enhanced Intrsuion detection system for discovering mailicious nodes in
mobile ad hoc network,”in Proc.IEEE Int. Conf. Commun.,Glasgow,Scotland,Jun. 24-28 ,2007 ,
pp.1154-1159
[13] Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami“EAACK-A Secure Intrusion-Detection System
for MANET's”,in Proc. IEEE Transactions On Industrial Electronics,Vol 60,No.3,March 2013,pp
1089-1098
Authors
Deepika Dua1
received her Mtech (Computer Engineering-networking) from YMCA
University of Science and Technology, Faridabad in the year 2014.Her research interests
include mobile ad-hoc networks.
Atul Mishra2 is working as an Associate Professor in the Department. of Computer
Engineering, YMCA University of Science and Technology, Haryana, India. He holds a
Masters Degree in Computer Science and Technology, from University of Roorkee (now IIT,
Roorkee) and obtained his PhD in Computer Science and Engg. from MD University,
Rohtak. He has about 16 years of work experience in the Optical Telecommunication
Industry specializing in Optical Network Planning and Network Management tools development. His
research interests include Cloud Computing, SOA, Network Management & Mobile Agents.

More Related Content

What's hot

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...IJMTST Journal
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169IJERA Editor
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
C0361011014
C0361011014C0361011014
C0361011014ijceronline
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication Systemijsrd.com
 
He3413241328
He3413241328He3413241328
He3413241328IJERA Editor
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
 

What's hot (19)

A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
B43040610
B43040610B43040610
B43040610
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
C0361011014
C0361011014C0361011014
C0361011014
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication System
 
He3413241328
He3413241328He3413241328
He3413241328
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
560 229-237
560 229-237560 229-237
560 229-237
 

Similar to SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK

A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 

Similar to SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK (20)

50120140507006
5012014050700650120140507006
50120140507006
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
N0704075079
N0704075079N0704075079
N0704075079
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 

More from Fransiskeran

EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSEQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSFransiskeran
 
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...Fransiskeran
 
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKCA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKFransiskeran
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSFransiskeran
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKFransiskeran
 
EVEN GRACEFUL LABELLING OF A CLASS OF TREES
EVEN GRACEFUL LABELLING OF A CLASS OF TREESEVEN GRACEFUL LABELLING OF A CLASS OF TREES
EVEN GRACEFUL LABELLING OF A CLASS OF TREESFransiskeran
 
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATION
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATIONSWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATION
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATIONFransiskeran
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFransiskeran
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksFransiskeran
 
9217graphhoc01
9217graphhoc019217graphhoc01
9217graphhoc01Fransiskeran
 

More from Fransiskeran (12)

EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHSEQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
EQUIVALENT CONDITION AND TWO ALGORITHMS FOR HAMILTONIAN GRAPHS
 
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
 
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORKCA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
EVEN GRACEFUL LABELLING OF A CLASS OF TREES
EVEN GRACEFUL LABELLING OF A CLASS OF TREESEVEN GRACEFUL LABELLING OF A CLASS OF TREES
EVEN GRACEFUL LABELLING OF A CLASS OF TREES
 
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATION
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATIONSWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATION
SWARM INTELLIGENCE FROM NATURAL TO ARTIFICIAL SYSTEMS: ANT COLONY OPTIMIZATION
 
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
9217graphhoc01
9217graphhoc019217graphhoc01
9217graphhoc01
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 DOI:10.5121/jgraphoc.2014.6302 7 SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK DEEPIKA DUA AND ATUL MISHRA Department of Computer Engineering, YMCA University of Science & Technology, Haryana, India ABSTRACT Mobile ad-hoc networks(MANET) is the collection of mobile nodes which are self organizing and are connected by wireless links where nodes which are not in the direct range communicate with each other relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious node can easily compromise the security of the network. A black-hole node is the malicious node which drops the entire packet coming to it and always shows the fresh route to the destination, even if the route to destination doesn't exist. This paper describes a scheme that will detect the intrusion in the network in the presence of black-hole node and its performance is compared with the previous technique. This novel technique helps to increase the network performance by reducing the overhead in the network. KEYWORDS MANET, Intrusion, Intrusion Detection system, Attacks 1. INTRODUCTION Mobile ad-hoc network is formed by the collection of some mobile nodes which can act both as a sender as well as receiver for data communication. They are decentralized networks which are self organizing and self maintaining. There is no fixed infrastructure in the network, the topology changes dynamically [1]. As a result of continuously changing topology, there is no fixed boundary of the network. The nodes cooperate with each other to forward the data packet. In such a network where there is no well-defined boundary, open medium, nodes rely on one other to forward the data packet, firewalls cannot be applied for securing these networks. Intrusion detection system [2] is used in these networks to detect the misbehaviour in the network. Intrusion detection system acts as a second layer in mobile ad-hoc networks [3]. Intrusion detection system can be network based [4] or host based [5] on the basis of the audit data collection or it can be signature based, anomaly based or specification based on the basis of the detection technique [6]. In this paper, a scheme is proposed which detects the misbehaving nodes in the network in the presence of black-hole attack [7] [8] and reduces the network overhead. Rest of the paper is organized as follows. In section 2, literature survey is presented. In section 3, scheme description is present, the methodology used is described. In section 4, simulation environment and results of the simulation are presented. And finally conclusion is presented in
  • 2. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 8 section5. 2. RELATED WORK Marti el al [9] proposed a scheme named Watchdog which is a reputation based scheme [10], in which after detecting the malicious node, information is propagated throughout the network so to avoid that node in future routes. The watchdog scheme works in two parts-in the first part the watchdog detects the malicious node by promiscuously listening to its next neighbour’s transmission. If a node doesn't forward the packet after a threshold, then watchdog declares that node as malicious. And then the path rater finds the new route to the destination excluding that malicious node. In this scheme malicious node is detected instead of malicious link there are six weaknesses that are mentioned by Marti [9]. They are 1)Receiver Collision problem 2)Ambiguous collision 3)Limited Transmission power 4) False misbehaviour 5) collusion 6) Partial Dropping. Liu at al [10] proposed a scheme named TWOACK, which detects the misbehaving links in the ad-hoc network instead of misbehaving nodes. It is an acknowledgement based scheme in which every third node in the route from sender to receiver requires to send an acknowledgement packet to the first node down the reverse route. Figure 1.TWOACK In figure 1, node Q sends a packet to node R which further forwards it to node S. When node S receives the packet and as it is third node in the path, it will send a TWOACK packet to the node Q acknowledging that it receives the packet successfully. All the nodes in the path work in the similar way. It solves the receiver collision problem and limited power problem of the watchdog scheme. But due to the exchange of too many acknowledgement packets, this scheme consumes too much battery power and hence can degrade the network performance. It works on DSR (Dynamic source routing) protocol. Sheltami et al. [11] proposed a scheme named Adaptive acknowledgment (AACK) which is based on TWOACK scheme. This scheme also works on DSR routing protocol. It is an advancement of the TWOACK scheme. It reduces the battery consumption by making the scheme a combination of end-to-end acknowledgement and TACK, which is similar to TWOACK. When the sender sends a data packet to destination, it waits for some time for the destination to acknowledge that data packet, but if the acknowledgement doesn't come within per-defined time, then it switches to TACK mode, where every third node sends the TACK packet to the nodes two hops away from it down the route.
  • 3. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 9 Figure 2: ACK scheme Figure 2 shows the ack scheme in which source P waits for the destination T to acknowledge the data packet. If acknowledgment from T doesn’t receive within specified time, then it switches to TACK mode by sending TACK packet. Nidal Nasser and Yunfeng Chen [12] proposed an approach called Ex-Watchdog. It was basically an improvement over the Watchdog scheme proposed by Marti [9].Out of the six weaknesses mentioned in the Watchdog [9] scheme it solves the false misbehaviour problem. In this scheme, each node maintains a table having entries of source address, destination address, and the statistics of the packets received, forwarded and stored. If any node reports a node as being misbehaving, then instead of trusting that node immediately, a new route to destination is found excluding the reported malicious node and number of packets received is checked at the destination node. If it is equal to the number of packets sent, then it is a false misbehaviour report and whosoever generated is declared as malicious .Then, pathrater or routeguard cooperated with the routing protocol and update the rating of node in their corresponding tables. This scheme fails to detect the misbehaviour when the misbehaving node is in all the routes from source to destination. Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami [13] proposed an approach called EAACK (Enhanced AACK) which solves receiver collisions problem, limited battery problem and false misbehaviour problem of the watchdog scheme. It is also an acknowledgement based scheme and to protect the acknowledgement packet from forging, this scheme makes use of digital signature. It is composed of three parts:- ACK- It is an end-to-end acknowledgement as described in AACK scheme. Sender waits for the destination to acknowledge data packets but if the acknowledgement doesn't come within a specified time, then it switches to S-ACK mode. S-ACK- In this mode, similar to TWOACK scheme, consecutive node works in a group i.e. every third node sends an S-ACK packet to its first node which is in the reverse directions. The difference between the S-ACK and TWOACK is that TWOACK immediately trusts the misbehaviour report and declares the node as malicious. But in this scheme, we switch to MRA mode to confirm the misbehaviour report. MRA- It stands for misbehaviour report authentication. This mode cooperates with the routing protocol to find a new route to the destination which excludes the reported misbehaviour node. Destination is checked for the data packet using the new route. If the data packet is found at the destination, then it is a false misbehaviour report and the node which generated this report will be declared as malicious, else the misbehaviour report is trusted and the node would be declared as misbehaving.
  • 4. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 10 3. PROPOSED APPROACH We proposed an algorithm that detects the intrusion in the presence of black hole node in the network. The proposed technique is an improvement over the Watchdog technique[9].In Watchdog each node continuously hears its next node transmission but in the proposed selective Watchdog technique only when the acknowledgment would not be received ,then IDS would start.Morever,in watchdog[9] technique all nodes monitor their neighbours but in proposed selective watchdog technique ,network of nodes are divided into clusters and only nodes in the cluster which have value greater than threshold monitor their neighbours. The pseudo code for the black-hole attack is shown in the algorithm. The input parameters for the algorithm are set of all the nodes, a threshold value which gets updated dynamically, source node, destination node and all the nodes which send the route reply to the source node. The algorithm works as follows:- The source waits for the destination to send acknowledgement to it after every 10th packet. If source receives the acknowledgement, then there is no misbehaviour in the network and process continues as such. But if the destination fails to acknowledge the data packets for a time period, then IDS starts its functionality. As in black-hole attack, there is a greater possibility that black-hole node will send the highest sequence number to the source in route reply. The proposed IDS algorithm maintains the list of all the nodes which send the route reply to the source with sequence number greater than the threshold value. The IDS will be applied only on those nodes which are in the list maintained by ids. Algorithm 1: Algorithm for detecting IDS Input: Threshold_seq_no. Set_of_all_nodes; Set_of_nodes_who_sent_route_reply; source; destination.
  • 5. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 11 1. Begin 2. If(pkt_received_by_dest==pkt_sent_by_source) then 3. network does not shows any malicious behaviour 4. Else if(pkt_received_by_dest < certain percentage of pkt sent by source over the network) 5. { 6. Then the network shows malicious behaviour and IDS is applied to detect malicious behaviour 7. For(int i=0; i<no._of_nodes_who_sent_route_reply; i++) 8. { 9. If(seq_no[route_reply[Node]] > Threshold_seq_no) then 10. List. add(next[Node]) 11. List. add(Node) 12. List. add(prev[Node]) 13. result= Segment_watchdog(List); 14. If(result==true) then //(i.e. if malicious node is found) 15. Exit; 16. ENDIF 17. Else 18. Continue 19. EndElse 20. } 21. } Algorithm: Segmented_Watchdog (List) 1. BEGIN 2. Result=false 3. malicious= Null 4. Node1= list. get(0) 5. Node2= list. get(1) 6. Node3=list. get(2) 7. //Chk(Sent_pkt[Node2]); 8. If(sent_pkt[Node2] == Received_pkt_by_node2) THEN 9. Monitor Node3 10. ENDIF 11. If(Sent_pkt_by_Node3==Received_pkt_by_Node3) THEN 12. No malicious activity detected in this segment 13. RETURN Result 14. END IF 15. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 16. Malicious= Node1 17. Result= True 18. RETURN Result 19. END ELSEIF 20. Else if(Sent_pkt_by_Node2 < Received_pkt_by_Node2) THEN 21. Malicious= Node2 22. Result=True 23. RETURN Result 24. END ELSEIF 25. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 26. Malicious= Node1 27. Result=True 28. RETURN Result 29. END ELSEIF 30. END
  • 6. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 12 For every node in the list, segment watchdog method gets called. In this method, the number of packets send and received by the node is checked. If number of send and received are equal, then its successor node in the route is checked else its predecessor node in the route is evaluated in the same way. The Flowchart of the technique is shown in figure3 Figure 3(a). Flowchart of proposed technique
  • 7. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 13 Figure 3(b). Flowchart of selective Watchdog 4. SIMULATION RESULTS 4.1. Assumptions • We have assumed the bi-directionality in the links. • Secondly, we have assumed that both the sender and receiver are trusted nodes, i.e. they are non-malicious. • Duplicate MAC address doesn't exist. • Lastly we have assumed that the nodes can overhear the transmission of their immediate neighbours. 4.2. Simulation Configuration The Simulation is carried out using the tool Network Simulator 2 (NS-2) version 2.35 on Linux operating system Ubuntu version 12.10.The system runs on a laptop with Core 2 Duo T6500 processor with 4-GB RAM. For plotting graph, trace-graph version 202 is used. • Grid Size: 500x500
  • 8. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 14 • Number of Nodes: 10 of which 5 were communicating • Packet traffic: CBR (Constant bit rate) on UDP • Packet Size: 512B • Packet Interval: 0.25 • Routing Protocol: AODV 4.3. Simulation Scenarios To simulate our result we have taken two scenarios. Scenario 1: In this scenario, Watchdog technique is implemented with one malicious node in path between source and destination. Scenario 2: In this, Proposed Technique is implemented with same parameters taken in scenario 1. 4.4. Performance Evaluation Scenario 1 In the first case, watchdog technique is implemented with a malicious node between the source and destination. Figure 4 shows the results that it detects the misbehaviour in the network of 10 nodes in 27.39 sec of neighbour detection. Figure 4: Screenshot of Watchdog Technique Scenario 2 In this scenario, proposed Selective Watchdog technique is implemented and then results are compared with the results of scenario 1. Figure 5 show that it took 27.36 sec for our scheme to detect the intrusion in the network.
  • 9. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 15 Figure 5: Screenshot of proposed technique Figure 6 shows the graph of comparison between the proposed scheme and the watchdog scheme. From the graph, it is clearly shown that the proposed scheme performs better than the watchdog scheme in terms of detection time to detect the intrusion in the network. Figure6 Detection Time Comparison of proposed scheme and watchdog scheme • Quantitative Analysis For a network of n nodes, Watchdog scheme have n-2 promiscuous listening. As every node have to monitor its next neighbour except the source which is not monitored by any node and the destination which will not monitor any node?
  • 10. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 16 For our proposed Selective Watchdog scheme, each cluster is of size say l, suppose we break the network of n nodes into K number of Clusters where K<<n i.e. n/l. Let say a threshold value of T qualifies n/l*1/t, where t is a qualifier and its value will determine the number of clusters to be checked. Promiscuous listening in a cluster of size l would be (l-2) in case both source and destination are included in the cluster and it would be l in other cases. Total promiscuous listening in proposed study is l*(nl-2) + 2*(l-2) This formula calculates the number of promiscuous listening and it is for only one data packet. Varying the number of cluster size and number of nodes taken, we can get different number of promiscuous listening. Table 1 shows the different values taken using the above formula. For n=12,l=3,the number of promiscuous listening in Watchdog technique is 10 and in proposed technique is 8.Similarly,for other values shown in table , number of promiscuous listening is calculated. Table 1. Promiscuous listening with varying number of nodes and cluster size N=12 N=24 N=36 L=3 8 20 32 L=4 7 16 25 L=6 8 14 20 Watchdog Technique 10 22 34 Figure 7 shows the graph for number of promiscuous listening for the proposed approach and the watchdog technique, plotted using the data provided in the table 1. The graph is plotted by varying the number of nodes and the size of cluster taken for each case. Figure 7 Number of nodes Vs Promiscuous Listening for proposed scheme
  • 11. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 17 • Experimental Analysis Number of nodes and size of cluster is varied and values are calculated by simulation. Table 2 shows the result of simulation. Table 2. Experimental value of promiscuous listening N 12 N 24 N 36 L=3 238 580 900 L=4 234 536 779 L=6 220 448 589 Watchdog Technique 1109 2230 3689 From these values, the graph is plotted. Figure 8 show the graph plotted using the above values. Figure 8 Number of nodes vs. Promiscuous listening Table 3 shows the statistics of the number of packets sent, number of packets received and percentage of packets received and drop in all three scenarios i.e. in absence of malicious node, in its presence without IDS and with IDS. The statistics shows that with the presence of IDS in the network, the network performance gets improved.
  • 12. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 18 Table 3: Statistics of simulation data 5. CONCLUSION Security is the major concern in the ad-hoc networks as nodes can be easily captured or compromised. Black-hole attack drops all the packets going through the malicious node. As a result network performance decrease drastically. The proposed scheme detects the intrusion in the presence of black-hole attack in the network and then routes the packets through secured path. The results obtained in various test scenarios suggest that proposed selective technique is better than conventional Watchdog technique in terms of time to detect the intrusion and number of promiscuous listening amongst the neighbours. The threshold reference removes many promiscuous listening as a big set of node lying under the value are not subjected to any detection related messages listening and associated networking cost. The graphs further show that making the cluster and starting the IDS only when acknowledgement not received further improves the network throughput as there would be further less network overhead. The proposed technique scales well with the increase in network size as shown in result graphs. A mathematical model capturing the costs discussed in the paper has been presented with results matching the experimental data. REFERENCES [1] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer-Verlag, 2008 [2] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system ,”, Journal of computer security,1999,pp.37-71. [3] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004. [4] David Wagner and Paolo Soto ,”Mimicry Attacks on Host-Based Intrusion Detection Systems”,in ACM, Nov.2002 [5] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system,”, Journal of computer security,1999,pp.37-71.
  • 13. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 19 [6] D. Sterne1, P. Balasubramanyam2, D. Carman1, B. Wilson1,R. Talpade3, C. Ko1,R. Balupari1, C-Y. Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 "A General Cooperative Intrusion Detection Architecture for MANETs. [7] Arun Kumar. R, Abhishek M. K et.al. ,”A Review on Intrusion Detection Systems in MANET,”,in International Journal of Engineering Science and Innovative Technology,vol.2,pp 609-618,March 2013 [8] Deepika Dua and Atul Mishra , “Intrusion Detection in Mobile Ad-hoc Network, “ in International Journal of Advanced Research in Computer and Communication Engg. ,vol.2,no.2,pp.5691-5694. [9] S. Marti, T.J.Giuli, K.Lai, and M.Baker,”Mitigating routing misbehavior in mobile ad hoc networks,”in Proc. 6Th Annu.Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp.255-265. [10] K.Liu, J.Deng, P.K.Varshney, and K.Balakrishnan , “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,”IEEE Trans Mobile Comput.,vol.6,no.5,pp.536-550 ,May 2007 [11] T.Sheltami et al. “AACK:Adaptive Acknowledgment Intrusion Detection for Manet with Node detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information Networking and Applications,2010,pp 634-640 [12] N.Nasser and Y.Chen,”Enhanced Intrsuion detection system for discovering mailicious nodes in mobile ad hoc network,”in Proc.IEEE Int. Conf. Commun.,Glasgow,Scotland,Jun. 24-28 ,2007 , pp.1154-1159 [13] Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami“EAACK-A Secure Intrusion-Detection System for MANET's”,in Proc. IEEE Transactions On Industrial Electronics,Vol 60,No.3,March 2013,pp 1089-1098 Authors Deepika Dua1 received her Mtech (Computer Engineering-networking) from YMCA University of Science and Technology, Faridabad in the year 2014.Her research interests include mobile ad-hoc networks. Atul Mishra2 is working as an Associate Professor in the Department. of Computer Engineering, YMCA University of Science and Technology, Haryana, India. He holds a Masters Degree in Computer Science and Technology, from University of Roorkee (now IIT, Roorkee) and obtained his PhD in Computer Science and Engg. from MD University, Rohtak. He has about 16 years of work experience in the Optical Telecommunication Industry specializing in Optical Network Planning and Network Management tools development. His research interests include Cloud Computing, SOA, Network Management & Mobile Agents.