AAU Institutional Repository

Intrusion Detection System for Mobile Ad-Hoc Networks (Manets)

Show simple item record

dc.contributor.advisor Biru, Getachew(PhD)
dc.contributor.author Desalegn, Konjit
dc.date.accessioned 2018-06-28T08:26:37Z
dc.date.available 2018-06-28T08:26:37Z
dc.date.issued 2006-04
dc.identifier.uri http://etd.aau.edu.et/handle/123456789/4546
dc.description.abstract The term wireless networking refers to technology that enables two or more computing devices to communicate using standard wireless networking protocols. Strictly speaking, any communication technology that uses such a scheme could be called wireless networking. Based on the coverage area, wireless networking technology can be classified as wide area network (ex. Mobile cellular standards such as GSM, IS95) and local area networking (ex. WLAN such as the IEEE 802.11x). Furthemore wireless networks can be classified as infrastructure based, that is a wireless network with a central control device or access point (IEEE WLAN and GSM) , the second type of wireless networks is the so called infrastructure-less or Mobile Ad hoc networking (MANETs). This thesis deals with the analysis and implementation of two types of intrusion detection techniques for mobile Ad-hoc networks. Since MANETs have no established infrastructure: they are also described as self-organized peer-to-peer wireless network composed of mobile nodes. MANETs represent a dynamic network with no centralized control (i.e., a node can enter or leave a MANET group without collapsing the network). This property allows MANETs to change the network topology of a peer collection of mobile nodes with in the coverage range of each other, dynamically. However, this nature of ad-hoc wireless networks also makes them very vulnerable to an adversary's malicious attacks. To detect those malicious attacks the network needs an intrusion detection system. Various types of intrusion detection systems for wireless Ad hoc networks exist and are discussed in the next sections. In this thesis performance evaluation of the MANET routing protocol, Ad-hoc on demand distance vector (AODV) is done using the so called misuse IDS technique. Implementation aspect of the IDS for a particular type of attack, called resource consumption attack is done using the NS- 2 simulator, for the AODV routing protocol. A significant decrease in packet drop is obtained due to the application of the misuse intrusion detection algorithm. Other metrics such as energy consumption, delay are considered, and show improvement due to the application of the IDS. An in-depth discussion of the simulation results can be found in section en_US
dc.language.iso en en_US
dc.publisher Addis Ababa University en_US
dc.subject Networks en_US
dc.title Intrusion Detection System for Mobile Ad-Hoc Networks (Manets) en_US
dc.type Thesis en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search AAU-ETD


My Account