Open Access Open Access  Restricted Access Subscription or Fee Access

Optimal Combined Intrusion Detection and Continuous Authentication in High Security Mobile Adhoc Network

S. Muthumariammal, S. Muthumariappan

Abstract


Wireless sensor network consisting of a large number of small sensors is effective for gathering various data (physical phenomena) in a variety of environments. The measured data from WSN can be sending to the MANET through sensor node. This project implements the security in MANET using authentications scheme such as password, various biomedical authentications, etc.

The physical data can be captured by sensor node and that is validating to the server in the network, this can be done by routing. The physical data (Packet) can be sent to the mobile ad hoc networks from sensor node by using routing of wireless data. In recent years, mobile ad hoc networks (MANETs) have become a popular research subject due to their self-configuration and self-maintenance capabilities. Wireless nodes can establish a dynamic network without the need of a fixed infrastructure. This type of network is very useful in tactical operations where there is no communication infrastructure. However, security is a major concern for providing trusted communications in a potentially hostile environment. This concern is mainly due to the peer-to-peer architecture in MANETs, system resource constraints, shared wireless medium, and highly dynamic network topology. Two complementary classes of approaches exist to protect high security MANETs, prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection.


Keywords


Mobile Ad Hoc Networks, Intrusion Detection, Passive Monitoring, False Positives, Analytical Models, Noise Modeling,

Full Text:

PDF

References


B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” Proc. ACM WiSe, pp. 21-30, Sept. 2002.

S. Bansal and M. Baker, “Observation-Based Cooperation Enforcementin Ad Hoc Networks,” Research Report cs. NI/0307012, Standford Univ., 2003.

R.V. Boppana and X. Su, “An Analysis of Monitoring BasedIntrusion Detection for Ad Hoc Networks,” Proc. IEEE Globecom: Computer and Comm. Network Security Symp., Dec. 2008.

R.V. Boppana and S. Desilva, “Evaluation of a Stastical Techniqueto Mitigate Malicious Control Packets in Ad Hoc Networks,” Proc. Int’l Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM)/Workshop Advanced Experimental Activities on WirelessNetworks and Systems, pp. 559-563, 2006.

S. Buchegger and J.Y. Le Boudec, “A Robust Reputation Systemfor Mobile Ad-Hoc Networks,” Proc. Workshop Economics of Peerto-Peer Systems (P2PE ’04), 2004.

S. Buchegger, C. Tissieres, and J.Y. Le Boudec, “A Test-Bed forMisbehavior Detection in Mobile Ad-Hoc Networks – How Much


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.