Title :
Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
Author :
Ahmed, Mariwan ; Hussain, Muhammad Awais
Author_Institution :
North Eastern Regional Inst. of Sci. & Technol., Itanagar, India
Abstract :
In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].
Keywords :
cryptography; firewalls; mobile ad hoc networks; routing protocols; AODV protocol; Debian Linux 6; IDS; MANET; black hole attacks; encryption software; firewalls; gray hole attacks; intrusion detection system; malicious node; mobile ad hoc networks; network failure detection; network throughput; ns 2.35 simulation; packet drop; sink hole; sleep deprivation torture; sybil attack; worm hole attacks; Ad hoc networks; Anodes; Computer aided software engineering; Mobile computing; Radiation detectors; Silicon; Xenon; AODV protocol; Black Hole Attack; Gray Hole Attack; Intrusion Detection System; MANETS; Packet Drop & Network Throughput;
Conference_Titel :
Electronics, Communication and Instrumentation (ICECI), 2014 International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4799-3982-4
DOI :
10.1109/ICECI.2014.6767377