Abstract
Routing protocol of MANET works with the presumption that nodes will transmit the data in collaboration. This presumption is a limitation of routing protocol which gives an occasion to attackers to hinder the security of the device and data in the network. Therefore, it becomes vital to develop methods and systems which will ensure the safety, integrity and confidentiality of data in such devices and systems. Although, existing IDS are able to detect various types of attack but some misbehavior goes undetected which potentially damage the network. Collusion attack is one such misbehavior where nodes perform maliciously in collaboration with neighboring nodes without being detected. In this work, Intrusion detection algorithm has been proposed that can effectively detect and isolate colluding nodes from the network so that these malicious nodes do not affect the performance of the network . Proposed detection algorithm uses in–out traffic information and overhearing statistics of nodes to identify colluding attackers. Detection algorithm works successfully for DSR routing protocol. Experimental results on NS-2 show that the proposed algorithm is capable of reducing the packet drops consequently improving the throughput of the network in presence of collusion attack.
Similar content being viewed by others
References
Jayakumar, G., & Gopinath, G. (2007). Ad hoc mobile wireless networks routing protocol: A review. Journal of Computer Science, 3(8), 574–582.
Sun, B. (2004). Intrusion detection in mobile ad hoc networks. Ph.D. disser-tation, Texas A and M Univ., College Station, TX.
Marti, S., Giuli, T. J., Lai, K. and Baker, M. (2000). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings 6th Annual International Conference Mobile Computing Networking, Boston, (pp. 255–265).
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbe-haviour in MANETs. IEEE Transactions Mobile Computing, 6(5), 536–550.
Balakrishnan, K., Jing D., and Pramod K. (2005). Varshney, TWOACK: preventing selfishness in mobile ad hoc networks. In Proceedings IEEE Wireless Communications and Networking Conference, vol. 4.
Sheltami, T., Al-Roubaiey, A., Shakshuki, E., & Mahmoud, A. (2009). Video transmission enhancement in presence of misbehaving nodes in MANETs. International Journal Multimedia System, 15(5), 273–282.
Kannhavong, B., Nakayama, H. and Jamalipour, A. (2006). A collusion attack against olsr-based mobile Ad Hoc networks. In Proceedings IEEE Global Telecommunications Conference.
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK- A secure intrusion detection system for manets. IEEE Transaction On Industrial Electronics, 60(3), 1089–1098.
Ghosh, T., Pissinou, N. and Makki, K. (2004). Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks. In 29th Annual IEEE International Conference on Local Computer Networks.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pragya, M., Arya, K.V. & Pal, S.H. Intrusion Detection System Against Colluding Misbehavior in MANETs. Wireless Pers Commun 100, 491–503 (2018). https://doi.org/10.1007/s11277-017-5094-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-5094-2