Title: Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol

Authors: M. Duraipandian; C. Palanisamy

Addresses: Department of CSE, VSB College of Engineering Technical Campus, Coimbatore, India ' Department of IT, Bannari Amman Institute of Technology, Sathyamangalam, India

Abstract: In a mobile ad hoc network, all the nodes will act as the client/server and it has the capability to forward the packets. Security is a major concern in a wireless network due to decentralised topology. Intruders may attack the transmission path between the source and destination. Existing technique used an ad hoc on demand vector (AODV) routing protocol to detect the attackers by an on demand basis. But it is not sufficient to detect all the denial of a service attack. Therefore, the proposed new protocol as an on-demand attack detection (ODAD) protocol is designed to detect various attacks in different ways. It contains three modes to detect the various attacks. They are: 1) finding drop node (FDN); 2) acknowledgement (ACK); 3) self-node correction (SNC). These modes are used to detect the attackers inside the mobile ad hoc network and then inform about the intruders to the remaining node in the network. Experimental results analyse the performance of throughput, packet delivery rate, drop rate and delay. This technique decreases the delay and drop rate, and increases the delivery rate and throughput compared with the existing technique.

Keywords: ad hoc on demand vector; AODV; throughput; drop rate; acknowledgement; denial of service attacks; DoS attacks; network layer intrusion detection; mobile ad hoc networks; MANETs; mobile networks; on-demand attack detection; routing protocols; network security; throughput; packet delivery rate; drop rate; delay.

DOI: 10.1504/IJESDF.2015.070391

International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.3, pp.245 - 257

Received: 05 Aug 2014
Accepted: 04 Dec 2014

Published online: 04 Jul 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article