Skip to main content
Log in

Intrusion Detection System Against Colluding Misbehavior in MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Routing protocol of MANET works with the presumption that nodes will transmit the data in collaboration. This presumption is a limitation of routing protocol which gives an occasion to attackers to hinder the security of the device and data in the network. Therefore, it becomes vital to develop methods and systems which will ensure the safety, integrity and confidentiality of data in such devices and systems. Although, existing IDS are able to detect various types of attack but some misbehavior goes undetected which potentially damage the network. Collusion attack is one such misbehavior where nodes perform maliciously in collaboration with neighboring nodes without being detected. In this work, Intrusion detection algorithm has been proposed that can effectively detect and isolate colluding nodes from the network so that these malicious nodes do not affect the performance of the network . Proposed detection algorithm uses in–out traffic information and overhearing statistics of nodes to identify colluding attackers. Detection algorithm works successfully for DSR routing protocol. Experimental results on NS-2 show that the proposed algorithm is capable of reducing the packet drops consequently improving the throughput of the network in presence of collusion attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Jayakumar, G., & Gopinath, G. (2007). Ad hoc mobile wireless networks routing protocol: A review. Journal of Computer Science, 3(8), 574–582.

    Article  Google Scholar 

  2. Sun, B. (2004). Intrusion detection in mobile ad hoc networks. Ph.D. disser-tation, Texas A and M Univ., College Station, TX.

  3. Marti, S., Giuli, T. J., Lai, K. and Baker, M. (2000). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings 6th Annual International Conference Mobile Computing Networking, Boston, (pp. 255–265).

  4. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbe-haviour in MANETs. IEEE Transactions Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

  5. Balakrishnan, K., Jing D., and Pramod K. (2005). Varshney, TWOACK: preventing selfishness in mobile ad hoc networks. In Proceedings IEEE Wireless Communications and Networking Conference, vol. 4.

  6. Sheltami, T., Al-Roubaiey, A., Shakshuki, E., & Mahmoud, A. (2009). Video transmission enhancement in presence of misbehaving nodes in MANETs. International Journal Multimedia System, 15(5), 273–282.

    Article  Google Scholar 

  7. Kannhavong, B., Nakayama, H. and Jamalipour, A. (2006). A collusion attack against olsr-based mobile Ad Hoc networks. In Proceedings IEEE Global Telecommunications Conference.

  8. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK- A secure intrusion detection system for manets. IEEE Transaction On Industrial Electronics, 60(3), 1089–1098.

    Article  Google Scholar 

  9. Ghosh, T., Pissinou, N. and Makki, K. (2004). Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks. In 29th Annual IEEE International Conference on Local Computer Networks.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mishra Pragya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pragya, M., Arya, K.V. & Pal, S.H. Intrusion Detection System Against Colluding Misbehavior in MANETs. Wireless Pers Commun 100, 491–503 (2018). https://doi.org/10.1007/s11277-017-5094-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5094-2

Keywords

Navigation