Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Performance of mobile ad hoc networking routing protocols in realistic scenarios
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Hi-index | 0.00 |
Several approaches have been proposed for intrusion detection in mobile adhoc networks. Most of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. Using a traditional intrusion detection and mitigation scheme designed for well-connected adhoc networks, the delivery ratio in a sparsely connected ad hoc network (50 nodes over 2000×2000 m2) can only improve from 76.5% to 79.9% with selective dropping attacks. Thus, we propose a ferrybased intrusion detection and mitigation (FBIDM) scheme for sparsely connected adhoc networks. Our simulation results indicate that our new ferry-based scheme is more effective than the traditional mitigation schemes that are used for well-connected mobile adhoc networks. Our FBIDM scheme reduces the impact of the data dropping attacks performed by malicious nodes in a sparsely connected ad hoc network. Without any mitigation scheme, the delivery ratio is 76.5% with selective dropping attacks. With FBIDM, the system achieves a delivery ratio that ranges from 87% (with a single ferry) to 93% (with four ferries) with selective dropping attacks. Without the mitigation scheme, the delivery ratio with blackhole attacks drops to 65.9%. With FBIDM, the achieved delivery ratio ranges from 82.9% (with a single ferry) to 91.9% (with four ferries) with blackhole attacks.