Eaack - A Secure Intrusion - Detection System For Manets
Eaack - A Secure Intrusion - Detection System For Manets
Eaack - A Secure Intrusion - Detection System For Manets
INTRODUCTION
Collection of mobile nodes with transmitter and receiver. Wireless network problem less geographical area coverage. Problem overcome by MANETs by allowing intermediate
BACKGROUND
NT,-& .N %ETECT .N &/&TEM N MANETs 0
Watchdog 0
Consist of two parts Watchdog and Pathrater. Watchdog serves as %& and Pathrater cooperates with ro"ting protocols. &"ffers from problem s"ch as receiver collision ' limited transmission
BACKGROUND(Cont.)
The acknowledgement process re#"ired led to "nwanted network overhead degrading life of entire network.
AAC1 0
Combination of TAC1 and AC1nowledge. ,ed"ces network overhead b"t fails to detect malicio"s nodes with
BACKGROUND(cont.)
%igital &ignat"re 0 Two scheme %&A and ,&A are "sed.
PROBLEM DEFINITION
Recei e! Co""isions # Collision of packets sent by $ sender at
receiver.
&o"rce
%ept of C&E ' $()$*)+
%estination
PROBLEM DEFINITION(cont.)
Li$ite% t!&ns$ission 'o(e! # Node intentionally limits
its transmission power to send packet to ne5t node.
&o"rce
%ept of C&E ' $()$*)+
%estination
PROBLEM DEFINITION(cont.)
F&"se $is)e*& io! !e'o!t # &ender node intentionally report
misbehavior of receiver node.
&o"rce
%estination
SC+EME DESCRIPTION
EAAC1 consist of + ma8or parts 0
AC1. &*AC1 9&ec"re AC1:. M,A 9 Misbehavior report a"thentication:. %igital &ignat"re.
header is incl"ded in EAAC1. e.g. for general data (( ' AC1 () ' &*AC1 )( ' M,A )).
%ept of C&E ' $()$*)+
SC+EME DESCRIPTION(cont.)
&o"rce
%estinatiom
SC+EME DESCRIPTION(cont.)
TW.AC1.
&o"rce
%ept of C&E ' $()$*)+
&*AC1 scheme
%estination
SC+EME DESCRIPTION(cont.)
MRA
,esolve weakness of watchdog i.e. fails to detect misbehaving
nodes.
&o"rce node searches its local knowledge to find alternative
ro"te to destination.
%estination receives M,A packet and searches and compares if reported packet was received.
SC+EME DESCRIPTION(cont.)
Di,it&" Si,n&t-!e
To
ens"re integrity of
&ince e5tra reso"rces are re#"ired for this p"rpose so ' both
SYSTEM ARC+ITECTURE
PERFORMANCE E.ALUATION
&im"lation methodologies 0
&cenario )0
To test performance of %& against receiver collison and limited power
transmission.
&cenario $0
To test performance of %& against false misbehavior report.
&cenario +0
To test performance of
acknowledgement packets.
%ept of C&E ' $()$*)+
PERFORMANCE E.ALUATION(cont.)
&im"lation Config"ration 0
&im"lation cond"cted within N& $.+2 on platform =CC 2.+. Two performance metrics adopted0
Packet delivery ratio 9P%,:. ,o"ting overhead 9,.:.
)($2 bits key for %&A and ,&A respectively. &ignat"re file si!e for %&A and ,&A are 7< and )+) bytes respectively. &ensor node "sed is Tmote &ky.
PERFORMANCE E.ALUATION(cont.)
Si$-"&tion Res-"ts/ Scen&!io 0#
PERFORMANCE E.ALUATION(cont.)
Scen&!io 1#
PERFORMANCE E.ALUATION(cont.)
Scen&!io 2 #
CONCLUSION
,es"lts demonstrate positive performance against e5isting
,.s b"t vastly improves P%, when attackers are smart eno"gh to forge acknowledgement packet.
;or seeking optimal scheme both %&A and ,&A were
FUTURE 3ORK
Possibilities of adopting hybrid cryptography techni#"es. Possibilities of adopting key e5change mechanism inspite
of predistrib"ted keys.
Testing the performance of EAAC1 in real environment
REFERENCES
,. >. Akbani' &. Patel' and %. C. ?inwala' @%o& attacks in mobile ad hoc networks0
approach for the detection of ro"ting misbehavio"r in MANETs'A EEE Trans. Mobile Comp"t.
N. Nasser and /. Chen' @Enhanced intr"sion detection systems for discovering
malicio"s nodes in mobile ad hoc network'A in Proc. EEE nt. Conf. Comm"n.
T+ANK YOU