Title
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement
Abstract
A Mobile Ad-hoc NETwork (MANET) is an infrastructureless network consisting of self-configuring mobile nodes connected by wireless links. Nodes rely on each other to store and forward packets. Most of the proposed MANET protocols assume cooperative and friendly network context, and do not address security issues. Furthermore, MANETs are highly vulnerable for passive and active attacks because of their open medium, rapidly changing topology, lack of centralized monitoring. Encryption and authentication solutions, which are considered as the first line of defense, are not sufficient to protect MANETs from packet dropping attacks. Most of the current Intrusion Detection Systems (IDSs) for MANETS rely on the Watchdog technique. In this research we study the behavior of this technique and propose a novel mechanism, named: Adaptive ACKnowledgment (AACK), for solving two significant problems: the limited transmission power and receiver collision. This mechanism is an enhancement to the TWOACK scheme where its detection overhead is reduced while the detection efficiency is increased. NS2 is used to simulate and evaluate the proposed scheme and compare it against the TWOACK and Watchdog methods. The obtained results show that the new AACK scheme outperforms both of the TWOACK and Watchdog methods in terms of network packet delivery ratio and routing overhead.
Year
DOI
Venue
2010
10.1109/AINA.2010.136
AINA
Keywords
Field
DocType
network packet delivery ratio,friendly network context,forward packets,twoack,infrastructureless network,watchdog,misbehaving,cryptography,ids,watchdog method,mobile ad-hoc network,node detection enhancement,detection efficiency,new aack scheme,routing overhead,detection overhead,encryption,mobile radio,packet dropping,proposed scheme,watchdog technique,authentication solutions,manet,dsr,wireless links,telecommunication network routing,ad hoc networks,adaptive acknowledgment intrusion detection,aack,twoack scheme,measurement,mobile ad hoc network,mobile ad hoc networks,protocols,power system protection,network topology,switches,routing protocols,intrusion detection system,intrusion detection,authentication,routing,motion pictures
Mobile ad hoc network,Store and forward,Computer science,Network packet,Computer network,Encryption,Network topology,Wireless ad hoc network,Intrusion detection system,Routing protocol,Distributed computing
Conference
ISSN
ISBN
Citations 
1550-445X
978-1-4244-6695-5
11
PageRank 
References 
Authors
0.83
3
5
Name
Order
Citations
PageRank
Anas Al-Roubaiey1528.49
T. Sheltami2110.83
A. Mahmoud3110.83
E. Shakshuki4204.60
H. Mouftah514411.46