Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Intrusion detection in MANETS


Published on

This presentation is about the intrusion detection techniques in a mobile ad hoc network. A MANET is an infrastructure-less network and has no central authority to govern the security check if the new node added to the network is trust worthy or not. There are number of security attacks in a MANET and there are number of advantages of a MANET. Most of its applications prove to be a boon when there is a need of a network for communication in a hostile environment and in remote areas. So it must be made secure. Work is still in progress regarding the security of MANET. The migration to wireless network from wired network
has been a global trend in the past few decades. The mobility
and scalability brought by wireless network made it possible in
many applications. Among all the contemporary wireless networks,
Mobile Ad hoc NETwork (MANET) is one of the most
important and unique applications. On the contrary to traditional
network architecture, MANET does not require a fixed network
infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they
are both within the same communication range. Otherwise, they
rely on their neighbors to relay messages. The self-configuring
ability of nodes inMANETmade it popular among criticalmission
applications like military use or emergency recovery. However,
the open medium and wide distribution of nodes make MANET
vulnerable to malicious attackers. In this case, it is crucial to
develop efficient intrusion-detection mechanisms to protect
MANET from attacks. With the improvements of the technology
and cut in hardware costs, we are witnessing a current trend of
expanding MANETs into industrial applications. To adjust to such
trend, we strongly believe that it is vital to address its potential
security issues. In this paper, we propose and implement a new
intrusion-detection system named Enhanced Adaptive ACKnowledgment
(EAACK) specially designed for MANETs. Compared
to contemporary approaches, EAACK demonstrates higher malicious-
behavior-detection rates in certain circumstances while does
not greatly affect the network performances.By definition, Mobile Ad hoc NETwork (MANET) is a
collection of mobile nodes equipped with both a wireless
transmitter and a receiver that communicate with each other
via bidirectional wireless links either directly or indirectly.
Industrial remote access and control via wireless networks are
becoming more and more popular these days. One of the
major advantages of wireless networks is its ability to allow
data communication between different parties and still maintain
their mobility. However, this communication is limited to
the range of transmitters. This means that two nodes cannot
communicate with each other when the distance between the
two nodes is beyond the communication range of their own.
MANET solves this problem by allowing intermediate parties
to relay data transmissions. T

Published in: Engineering

Intrusion detection in MANETS

  2. 2. MANET  Mobile ad hoc network  Is used to exchange information.  Each node is willing to forward data to other nodes.  Does not rely on fixed infrastructure.  No central authority.
  3. 3. Why MANET?  Advantages: low-cost, flexibility  Ease & Speed of deployment  Decreased dependence on infrastructure  Applications:  Military environments  soldiers, tanks, planes  Civilian environments  vehicle networks  conferences / stadiums  outside activities  Emergency operations  search-and-rescue / policing and fire fighting
  4. 4. Problems In MANET  Routing  Security and Reliability  Quality of Service  Internetworking  Power Consumption
  5. 5. Security  A major issue in Mobile ad-hoc network is “SECURITY”.  Two approaches in protecting mobile ad- hoc networks  Reactive approach: Seeks to detect security threats and react accordingly.  Proactive approach: Attempts to prevent an attacker from launching attacks through various cryptographic techniques
  6. 6. Classification of Security Attacks
  7. 7. IDS-MANET  IDS: Intrusion detection System which is used to detect and report the malicious activity in ad hoc networks.  Ex: Detecting critical nodes using IDS  Intrusion Detection System (IDS) can collect and analyze audit data for the entire network.  Critical node is a node whose failure or malicious behavior disconnects or significantly degrades the performance of the network.
  8. 8. Contd..  Packets may be dropped due to network congestion or because a malicious node is not faithfully executing a routing algorithm.  Researchers have proposed a number of collaborative IDS systems.  Some of the schemes are neighbor- monitoring, trust-building, and cluster- based voting schemes which are used to detect and report the malicious activity in ad hoc networks.
  9. 9. Existing Approaches  Watchdog  TWOACK  Adaptive Acknowledgment (AACK)
  10. 10. 1.Watchdog  Listen to next hop’s transmission.  If the node fails, it increases its failure counter.  The node is reported as misbehaving if failure counter increases a threshold.
  11. 11. 2.TWOACK
  12. 12. CONTD…  Solves the receiver collision and limited transmission power problems posed by Watchdog.  But added a significant amount of unwanted network overhead.  Due to the limited battery power nature of MANETs, such redundant transmission process can easily degrade the life span of the entire network
  13. 13. 3.AACK
  14. 14. Contd…  greatly reduces the network overhead  Fail to detect malicious nodes with the presence of false misbehaviour report and forged acknowledgment packets.
  15. 15. EAACK
  16. 16. Contd…  Designed to tackle three of the six weaknesses of Watchdog scheme-  false misbehaviour,  limited transmission power,  and receiver collision.  digital signature scheme is adopted during the packet transmission process.
  17. 17. Problem-1
  18. 18. Problem-2
  19. 19. Problem-3
  20. 20. EAACK- Scheme Description  Introduction of digital signature.  3 Major parts- ACK,S-ACK, MRA.
  21. 21. Contd…  ACK is basically an end-to-end acknowledgment scheme.  S-ACK scheme is an improved version of the TWOACK scheme - three consecutive nodes work in a group.  The MRA scheme detects misbehaving nodes with the presence of false misbehavior report.  EAACK requires all acknowledgment packets to be digitally signed
  22. 22. System Control Flow
  23. 23. THANK U