Skip to main content

A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs

  • Conference paper
  • 1005 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8303))

Abstract

In MANETs, supporting a routing protocol with an intrusion detection system (IDS) is crucial in ensuring secure communication. This paper proposes a novel Voucher assisted Adaptive ACKnowledgement (VAACK) mechanism for the detection of routing misbehaviors in MANETs. The protocol uses a novel voucher acknowledgment technique which is assisted by an efficient route scanning module. The proposed protocol is complete in the absence of node collusions and, it is also sound. Moreover, the protocol can partially fight against node collusion. The analytical and the simulation results confirm the effectiveness of the proposed protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maity, S., Hansdah, R.C.: Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. In: Venkatakrishnan, V., Goswami, D. (eds.) ICISS 2012. LNCS, vol. 7671, pp. 277–293. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Maity, S., Hansdah, R.C.: A Secure and Efficient Authentication Protocol (SEAP) for MANETs with Membership Revocation. In: Proc. of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2013), Barcelona, Spain, pp. 363–370 (March 2013)

    Google Scholar 

  3. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th Annual International Conference on Mobile Computing and Networking, vol. 6(11), pp. 255–265 (2000)

    Google Scholar 

  4. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proc. of the IEEE Radio and Wireless Conference (RAWCON 2003), pp. 75–78 (2003)

    Google Scholar 

  5. Parker, J.P.A.J.J., Undercoffer, J., Pinkston, J., Joshi, A.: On intrusion detection and response for mobile ad hoc networks. In: Proc. of the IEEE International Conference on Performance, Computing, and Communications, pp. 747–752 (2004)

    Google Scholar 

  6. Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad-hoc networks. In: Proc. of the IEEE International Conference on Communications (ICC 2007), pp. 1154–1159 (2007)

    Google Scholar 

  7. Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing 6(5), 536–550 (2007)

    Article  Google Scholar 

  8. Sheltami, T., Al-Roubaiey, A., Shakshuki, E., Mahmoud, A.: Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems 15(5), 273–282 (2009)

    Article  Google Scholar 

  9. Shakshuki, E., Kang, N., Sheltami, T.: EAACK - A Secure Intrusion Detection System for MANETs. IEEE Transactions on Industrial Electronics 60(3), 1089–1098 (2013)

    Article  Google Scholar 

  10. QualNet 5.0: Scalable Network Technologies, Inc., 6100 Center Drive, Suite 1250, Los Angeles, CA 90045, http://www.scalable-networks.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maity, S., Hansdah, R.C. (2013). A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45204-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45203-1

  • Online ISBN: 978-3-642-45204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics