Intrusion Detection System for Mobile Ad-Hoc Networks (Manets)

No Thumbnail Available

Date

2006-04

Journal Title

Journal ISSN

Volume Title

Publisher

Addis Ababa University

Abstract

The term wireless networking refers to technology that enables two or more computing devices to communicate using standard wireless networking protocols. Strictly speaking, any communication technology that uses such a scheme could be called wireless networking. Based on the coverage area, wireless networking technology can be classified as wide area network (ex. Mobile cellular standards such as GSM, IS95) and local area networking (ex. WLAN such as the IEEE 802.11x). Furthemore wireless networks can be classified as infrastructure based, that is a wireless network with a central control device or access point (IEEE WLAN and GSM) , the second type of wireless networks is the so called infrastructure-less or Mobile Ad hoc networking (MANETs). This thesis deals with the analysis and implementation of two types of intrusion detection techniques for mobile Ad-hoc networks. Since MANETs have no established infrastructure: they are also described as self-organized peer-to-peer wireless network composed of mobile nodes. MANETs represent a dynamic network with no centralized control (i.e., a node can enter or leave a MANET group without collapsing the network). This property allows MANETs to change the network topology of a peer collection of mobile nodes with in the coverage range of each other, dynamically. However, this nature of ad-hoc wireless networks also makes them very vulnerable to an adversary's malicious attacks. To detect those malicious attacks the network needs an intrusion detection system. Various types of intrusion detection systems for wireless Ad hoc networks exist and are discussed in the next sections. In this thesis performance evaluation of the MANET routing protocol, Ad-hoc on demand distance vector (AODV) is done using the so called misuse IDS technique. Implementation aspect of the IDS for a particular type of attack, called resource consumption attack is done using the NS- 2 simulator, for the AODV routing protocol. A significant decrease in packet drop is obtained due to the application of the misuse intrusion detection algorithm. Other metrics such as energy consumption, delay are considered, and show improvement due to the application of the IDS. An in-depth discussion of the simulation results can be found in section

Description

Keywords

Networks

Citation