Вы находитесь на странице: 1из 6

EAACKA Secure Intrusion-Detection System for MANETs

Abstract: The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and uni ue applications. !n the contrary to traditional network architecture, MANET does not re uire a fi"ed network infrastructure# e$ery single node works as both a transmitter and a recei$er. Nodes communicate directly with each other when they are both within the same communication range. !therwise, they rely on their neighbors to relay messages. The self%configuring ability of nodes inMANETmade it popular among critical mission applications like military use or emergency reco$ery. &owe$er, the open medium and wide distribution of nodes make MANET $ulnerable to malicious attackers. 'n this case, it is crucial to de$elop efficient intrusion%detection mechanisms to protect MANET from attacks. (ith the impro$ements of the technology and cut in hardware costs, we are witnessing a current trend of e"panding MANETs into industrial applications. To ad)ust to such trend, we strongly belie$e that it is $ital to address its potential security issues. 'n this paper, we propose and implement a new intrusion%detection system named Enhanced Adapti$e A*+nowledgment (EAA*+) specially designed for MANETs. *ompared to contemporary approaches, EAA*+ demonstrates higher malicious%beha$ior%detection rates in certain circumstances while does not greatly affect the network performances. AIM: 'n this paper a new 'ntrusion%,etection system techni ue is used to pre$ent a malicious node in the MANET-, the malicious attacker used the wide distribution and open medium features of the MANET- to establish the $ulnerabilities in the network. Synopsis: MANET is a self%configuring infrastructure network of mobile de$ices connected by wireless network it e uipped with both a wireless transmitter and a recei$er that communicate each other bidirectional wireless either directly or indirectly.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

EAACKA Secure Intrusion-Detection System for MANETs

!ne of the ma)or ad$antages of wireless networks is its ability to allow data communication between different parties and still maintain their mobility. This means that two nodes cannot communicate with each other when the distance between the two nodes is beyond the communication range of their own. MANET sol$es this problem by allowing intermediate parties to relay data transmissions. This is achie$ed by di$iding MANET into two types of networks, namely, single%hop and multihop. .nfortunately, the open medium and remote distribution of MANET make it $ulnerable to $arious types of attacks.

,ue to the nodes lack of physical protection, malicious attackers can easily capture and compromise nodes to achie$e attacks. 'n particular, considering the fact that most routing protocols in MANETs assume that e$ery node in the network beha$es cooperati$ely with other nodes and presumably not malicious.

'f MANET can detect the attackers as soon as they enter the network, we will be able to completely eliminate the potential damages caused by compromised nodes at the first time. ',-s usually act as the second layer in MANETs, and they are a great complement to e"isting proacti$e approaches.

Existing System: /y definition, Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes e uipped with both a wireless transmitter and a recei$er that communicate with each other $ia bidirectional wireless links either directly or indirectly. .nfortunately, the open medium and remote distribution of MANET make it $ulnerable to $arious types of attacks. 0or e"ample, due to the nodes1 lack of physical protection, malicious attackers can easily capture and compromise nodes to achie$e attacks. 'n particular, considering the fact that most routing protocols in MANETs assume that e$ery node in the network beha$es cooperati$ely with other nodes and presumably not malicious, attackers can easily compromise MANETs by inserting malicious or noncooperati$e nodes into the network. 0urthermore, because of MANET1s distributed

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

EAACKA Secure Intrusion-Detection System for MANETs

architecture and changing topology, a traditional centrali2ed monitoring techni ue is no longer feasible in MANETs. 'n such case, it is crucial to de$elop an intrusion%detection system (',-) specially designed for MANETs. Disadvantages of Existing System: (atchdog scheme fails to detect malicious misbeha$iors with the presence of the following3 4) ambiguous collisions# 5) recei$er collisions# 6) limited transmission power# 7) false misbeha$ior report# 8) collusion# and 9) partial dropping. The T(!A*+ scheme successfully sol$es the recei$er collision and limited transmission power problems posed by (atchdog. &owe$er, the acknowledgment process re uired in e$ery packet transmission process added a significant amount of unwanted network o$erhead. ,ue to the limited battery power nature of MANETs, such redundant transmission process can easily degrade the life span of the entire network. The concept of adopting a hybrid scheme in AA*+ greatly reduces the network o$erhead, but both T(!A*+ and AA*+ still suffer from the problem that they fail to detect malicious nodes with the presence of false misbeha$ior report and forged acknowledgment packets. Proposed System: 'n fact, many of the e"isting ',-s in MANETs adopt an acknowledgment%based scheme, including T(!A*+ and AA*+. The functions of such detection schemes all largely depend on the acknowledgment packets. &ence, it is crucial to guarantee that the acknowledgment packets are $alid and authentic. To address this concern, we adopt a digital signature in our proposed scheme named Enhanced AA*+ (EAA*+).

Advantages of Proposed System:

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

EAACKA Secure Intrusion-Detection System for MANETs

!ur proposed approach EAA*+ is designed to tackle three of the si" weaknesses of (atchdog scheme, namely, false misbeha$ior, limited transmission power, and recei$er collision.

System Architecture

Node A

Node B

Node C

Node D

Successful ACK

TTL Expired to get Response

ACK

S- ACK

MODU ES:
Server

Response / Digital Signature

A*+ implementation -ecure Acknowledgment (-%A*+) Misbeha$ior :eport Authentication (M:A)

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

EAACKA Secure Intrusion-Detection System for MANETs

,igital -ignature ;alidation Modu!es Description:

A"# imp!ementation: A*+ is basically an end < to < end acknowledgment scheme .'t is a part of EAA*+ scheme aiming to reduce the network o$erhead when no network misbeha$ior is detected. The basic flow is if Node A sends an packet p4 to destination Node ,, if all the intermediate node are cooperati$e and successfully recei$es the re uest in the Node ,. 't will send an A*+ to the source (Node A) , if A*+ from the destination get delayed then it -%A*+ process will be initiali2ed. Secure Ac$no%!edgment &S'A"#(: 'n the -%A*+ principle is to let e$ery three consecuti$e nodes work in a group to detect misbeha$ing nodes. 0or e$ery three consecuti$e nodes in the route, the third node is re uired to send an -%A*+ acknowledgment packet to the first node. The intention of introducing -%A*+ mode is to detect misbeha$ing nodes in the presence of recei$er collision or limited transmission power. Misbehavior )eport Authentication &M)A(: The M:A scheme is designed to resol$e the weakness of watchdog with respect to the false misbeha$ior report. 'n this source node checks the alternate route to reach destination. .sing the generated path if the packet reaches the destination then it is concluded as the false report. Digita! Signature *a!idation: 'n all the three parts of EAA*+, namely, A*+, -%A*+, and M:A, are acknowledgment%based detection schemes. They all rely on acknowledgment packets to detect misbeha$iors in the network. Thus, it is e"tremely important to ensure that all acknowledgment packets in EAA*+

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

EAACKA Secure Intrusion-Detection System for MANETs

are authentic and untainted. !therwise, if the attackers are smart enough to forge acknowledgment packets, all of the three schemes will be $ulnerable.

System "onfiguration:' +ard%are "onfiguration:'

=rocessor -peed :AM &ard ,isk +ey /oard Mouse Monitor %

% % % % %

=entium <'; 4.4 >h2 589 M/(min) 5? >/ -tandard (indows +eyboard

Two or Three /utton Mouse % -;>A

Soft%are configuration:'

Operating System Programming Language Java Version )E,E)E-"E:

: Windows XP : JAVA : JDK 1. ! a"ove.

Elhadi M. -hakshuki, -enior Member, 'EEE, Nan +ang, and Tarek :. -heltami, Member, 'EEE, @EAA"#.A Secure Intrusion'Detection System for MA-E/sA, 'EEE T:AN-A*T'!N!N 'N,.-T:'AB EBE*T:!N'*-, ;!B. 9?, N!. 6, MA:*& 5?46.

Contact: 040-40274843, 9703109334 Email id: academicliveprojects !mail"com# $$$"lo!icsystems"or!"in

Вам также может понравиться