Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:2 Issue:2 Year: 08 March,2014 Pages:75-83
Mobile ad hoc network is one of most important research topics as they are infrastructure-less and mobile. Open medium, wide distribution and de-centralization of nodes makes MANETs vulnerable and malicious. It is crucial to develop efficient intrusion detection system to protect MANETs. A new intrusion detection system named bandwidth shared acknowledgment (BSA) in which all transmission packet data and acknowledge should be cryptographically signed. Swarm Based Detection techniques for multiple paths establishment among source to destination and random casting is use during intrusion in MANETs. Eavesdropping in MANET is scheduled based on number of acknowledgement received at every instance in network. The theme of this paper is to provide a seamless message delivery in a MANET despite its threats using random casting and the existing mechanisms like 2-hop acknowledgement or source directed acknowledgement does not hold when a network topology changes frequently or when a node is compromised. These drawbacks are to be addressed ensuring secured connecting edges between source and destination. The source collision, exposure to vulnerability is also minimized using this mechanism. We propose an optimize solution for above problem using BSA techniques which overcomes eaves dropping based on acknowledgement from intermediate only and P2P content-based file sharing system, namely Intracommunity File Searching, for disconnected MANETs. The system uses an interest extraction algorithm to derive a node’s interests from its files for content- based file searching
Bandwidth Shared Acknowledgment (BSA) Mobile Ad Hoc Network (MANET) Random Casting Swarm Detection MANET
[1] G.Indirani and K.Selvakumar, “Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks”,International Journal of Computer Applications (0975 – 8887),Volume 50– No.19, July 2012. [2] I. D. Chakeres and E. M. Belding-Royer, “AODV Routing Protocol Implementation Design,” in Proceedings of the International Workshop on Wireless Ad hoc Networking (WWAN), Tokyo, Japan, March 2004. [3] J. Hortelano, J. Carlos and P. Manzoni “Watchdog Intrusion Detection Systems in MANETs” IJCSNS International Journal of Computer Science and Network Security,6(6):209_219, June 2006. [4] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536– 550, May 2007. [5] L Massoulié and J Roberts” Bandwidth Sharing” IEEE/ACM Trans on Networking, Vol. 10, No. 3, June 2002. [6] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.