SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
SELECTIVE WATCHDOG TECHNIQUE FOR 
INTRUSION DETECTION IN MOBILE AD-HOC 
NETWORK 
DEEPIKA DUA AND ATUL MISHRA 
Department of Computer Engineering, YMCA University of Science & Technology, 
Haryana, India 
ABSTRACT 
Mobile ad-hoc networks(MANET) is the collection of mobile nodes which are self organizing and are 
connected by wireless links where nodes which are not in the direct range communicate with each other 
relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious node can 
easily compromise the security of the network. A black-hole node is the malicious node which drops the 
entire packet coming to it and always shows the fresh route to the destination, even if the route to 
destination doesn't exist. This paper describes a scheme that will detect the intrusion in the network in the 
presence of black-hole node and its performance is compared with the previous technique. This novel 
technique helps to increase the network performance by reducing the overhead in the network. 
KEYWORDS 
MANET, Intrusion, Intrusion Detection system, Attacks 
1. INTRODUCTION 
Mobile ad-hoc network is formed by the collection of some mobile nodes which can act both as a 
sender as well as receiver for data communication. They are decentralized networks which are 
self organizing and self maintaining. There is no fixed infrastructure in the network, the topology 
changes dynamically [1]. As a result of continuously changing topology, there is no fixed 
boundary of the network. The nodes cooperate with each other to forward the data packet. In such 
a network where there is no well-defined boundary, open medium, nodes rely on one other to 
forward the data packet, firewalls cannot be applied for securing these networks. Intrusion 
detection system [2] is used in these networks to detect the misbehaviour in the network. 
Intrusion detection system acts as a second layer in mobile ad-hoc networks [3]. Intrusion 
detection system can be network based [4] or host based [5] on the basis of the audit data 
collection or it can be signature based, anomaly based or specification based on the basis of the 
detection technique [6]. 
In this paper, a scheme is proposed which detects the misbehaving nodes in the network in the 
presence of black-hole attack [7] [8] and reduces the network overhead. 
Rest of the paper is organized as follows. In section 2, literature survey is presented. In section 3, 
scheme description is present, the methodology used is described. In section 4, simulation 
environment and results of the simulation are presented. And finally conclusion is presented in 
DOI:10.5121/jgraphoc.2014.6302 7
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
8 
section5. 
2. RELATED WORK 
Marti el al [9] proposed a scheme named Watchdog which is a reputation based scheme [10], in 
which after detecting the malicious node, information is propagated throughout the network so to 
avoid that node in future routes. 
The watchdog scheme works in two parts-in the first part the watchdog detects the malicious node 
by promiscuously listening to its next neighbour’s transmission. If a node doesn't forward the 
packet after a threshold, then watchdog declares that node as malicious. And then the path rater 
finds the new route to the destination excluding that malicious node. In this scheme malicious 
node is detected instead of malicious link there are six weaknesses that are mentioned by Marti 
[9]. They are 1)Receiver Collision problem 2)Ambiguous collision 3)Limited Transmission 
power 4) False misbehaviour 5) collusion 6) Partial Dropping. 
Liu at al [10] proposed a scheme named TWOACK, which detects the misbehaving links in the 
ad-hoc network instead of misbehaving nodes. It is an acknowledgement based scheme in which 
every third node in the route from sender to receiver requires to send an acknowledgement packet 
to the first node down the reverse route. 
Figure 1.TWOACK 
In figure 1, node Q sends a packet to node R which further forwards it to node S. When node S 
receives the packet and as it is third node in the path, it will send a TWOACK packet to the node 
Q acknowledging that it receives the packet successfully. All the nodes in the path work in the 
similar way. 
It solves the receiver collision problem and limited power problem of the watchdog scheme. But 
due to the exchange of too many acknowledgement packets, this scheme consumes too much 
battery power and hence can degrade the network performance. It works on DSR (Dynamic 
source routing) protocol. 
Sheltami et al. [11] proposed a scheme named Adaptive acknowledgment (AACK) which is 
based on TWOACK scheme. This scheme also works on DSR routing protocol. It is an 
advancement of the TWOACK scheme. It reduces the battery consumption by making the scheme 
a combination of end-to-end acknowledgement and TACK, which is similar to TWOACK. When 
the sender sends a data packet to destination, it waits for some time for the destination to 
acknowledge that data packet, but if the acknowledgement doesn't come within per-defined time, 
then it switches to TACK mode, where every third node sends the TACK packet to the nodes two 
hops away from it down the route.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
9 
Figure 2: ACK scheme 
Figure 2 shows the ack scheme in which source P waits for the destination T to acknowledge the 
data packet. If acknowledgment from T doesn’t receive within specified time, then it switches to 
TACK mode by sending TACK packet. 
Nidal Nasser and Yunfeng Chen [12] proposed an approach called Ex-Watchdog. It was basically 
an improvement over the Watchdog scheme proposed by Marti [9].Out of the six weaknesses 
mentioned in the Watchdog [9] scheme it solves the false misbehaviour problem. In this scheme, 
each node maintains a table having entries of source address, destination address, and the 
statistics of the packets received, forwarded and stored. If any node reports a node as being 
misbehaving, then instead of trusting that node immediately, a new route to destination is found 
excluding the reported malicious node and number of packets received is checked at the 
destination node. If it is equal to the number of packets sent, then it is a false misbehaviour report 
and whosoever generated is declared as malicious .Then, pathrater or routeguard cooperated with 
the routing protocol and update the rating of node in their corresponding tables. This scheme fails 
to detect the misbehaviour when the misbehaving node is in all the routes from source to 
destination. 
Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami [13] proposed an approach called EAACK 
(Enhanced AACK) which solves receiver collisions problem, limited battery problem and false 
misbehaviour problem of the watchdog scheme. It is also an acknowledgement based scheme and 
to protect the acknowledgement packet from forging, this scheme makes use of digital signature. 
It is composed of three parts:- 
ACK- It is an end-to-end acknowledgement as described in AACK scheme. Sender waits for the 
destination to acknowledge data packets but if the acknowledgement doesn't come within a 
specified time, then it switches to S-ACK mode. 
S-ACK- In this mode, similar to TWOACK scheme, consecutive node works in a group i.e. every 
third node sends an S-ACK packet to its first node which is in the reverse directions. The 
difference between the S-ACK and TWOACK is that TWOACK immediately trusts the 
misbehaviour report and declares the node as malicious. But in this scheme, we switch to MRA 
mode to confirm the misbehaviour report. 
MRA- It stands for misbehaviour report authentication. This mode cooperates with the routing 
protocol to find a new route to the destination which excludes the reported misbehaviour node. 
Destination is checked for the data packet using the new route. If the data packet is found at the 
destination, then it is a false misbehaviour report and the node which generated this report will be 
declared as malicious, else the misbehaviour report is trusted and the node would be declared as 
misbehaving.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
10 
3. PROPOSED APPROACH 
We proposed an algorithm that detects the intrusion in the presence of black hole node in the 
network. The proposed technique is an improvement over the Watchdog technique[9].In 
Watchdog each node continuously hears its next node transmission but in the proposed selective 
Watchdog technique only when the acknowledgment would not be received ,then IDS would 
start.Morever,in watchdog[9] technique all nodes monitor their neighbours but in proposed 
selective watchdog technique ,network of nodes are divided into clusters and only nodes in the 
cluster which have value greater than threshold monitor their neighbours. The pseudo code for the 
black-hole attack is shown in the algorithm. The input parameters for the algorithm are set of all 
the nodes, a threshold value which gets updated dynamically, source node, destination node and 
all the nodes which send the route reply to the source node. 
The algorithm works as follows:- 
The source waits for the destination to send acknowledgement to it after every 10th packet. If 
source receives the acknowledgement, then there is no misbehaviour in the network and process 
continues as such. But if the destination fails to acknowledge the data packets for a time period, 
then IDS starts its functionality. 
As in black-hole attack, there is a greater possibility that black-hole node will send the highest 
sequence number to the source in route reply. The proposed IDS algorithm maintains the list of 
all the nodes which send the route reply to the source with sequence number greater than the 
threshold value. 
The IDS will be applied only on those nodes which are in the list maintained by ids. 
Algorithm 1: Algorithm for detecting IDS 
Input: Threshold_seq_no. Set_of_all_nodes; Set_of_nodes_who_sent_route_reply; source; 
destination.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
11 
1. Begin 
2. If(pkt_received_by_dest==pkt_sent_by_source) then 
3. network does not shows any malicious behaviour 
4. Else if(pkt_received_by_dest < certain percentage of pkt sent by source over the network) 
5. { 
6. Then the network shows malicious behaviour and IDS is applied to detect malicious behaviour 
7. For(int i=0; i<no._of_nodes_who_sent_route_reply; i++) 
8. { 
9. If(seq_no[route_reply[Node]] > Threshold_seq_no) then 
10. List. add(next[Node]) 
11. List. add(Node) 
12. List. add(prev[Node]) 
13. result= Segment_watchdog(List); 
14. If(result==true) then //(i.e. if malicious node is found) 
15. Exit; 
16. ENDIF 
17. Else 
18. Continue 
19. EndElse 
20. } 
21. } 
Algorithm: Segmented_Watchdog (List) 
1. BEGIN 
2. Result=false 
3. malicious= Null 
4. Node1= list. get(0) 
5. Node2= list. get(1) 
6. Node3=list. get(2) 
7. //Chk(Sent_pkt[Node2]); 
8. If(sent_pkt[Node2] == Received_pkt_by_node2) THEN 
9. Monitor Node3 
10. ENDIF 
11. If(Sent_pkt_by_Node3==Received_pkt_by_Node3) THEN 
12. No malicious activity detected in this segment 
13. RETURN Result 
14. END IF 
15. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 
16. Malicious= Node1 
17. Result= True 
18. RETURN Result 
19. END ELSEIF 
20. Else if(Sent_pkt_by_Node2 < Received_pkt_by_Node2) THEN 
21. Malicious= Node2 
22. Result=True 
23. RETURN Result 
24. END ELSEIF 
25. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 
26. Malicious= Node1 
27. Result=True 
28. RETURN Result 
29. END ELSEIF 
30. END
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
For every node in the list, segment watchdog method gets called. In this method, the number of 
packets send and received by the node is checked. If number of send and received are equal, then 
its successor node in the route is checked else its predecessor node in the route is evaluated in the 
same way. 
12 
The Flowchart of the technique is shown in figure3 
Figure 3(a). Flowchart of proposed technique
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
13 
Figure 3(b). Flowchart of selective Watchdog 
4. SIMULATION RESULTS 
4.1. Assumptions 
• We have assumed the bi-directionality in the links. 
• Secondly, we have assumed that both the sender and receiver are trusted nodes, i.e. they 
are non-malicious. 
• Duplicate MAC address doesn't exist. 
• Lastly we have assumed that the nodes can overhear the transmission of their immediate 
neighbours. 
4.2. Simulation Configuration 
The Simulation is carried out using the tool Network Simulator 2 (NS-2) version 2.35 on Linux 
operating system Ubuntu version 12.10.The system runs on a laptop with Core 2 Duo T6500 
processor with 4-GB RAM. For plotting graph, trace-graph version 202 is used. 
• Grid Size: 500x500
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
14 
• Number of Nodes: 10 of which 5 were communicating 
• Packet traffic: CBR (Constant bit rate) on UDP 
• Packet Size: 512B 
• Packet Interval: 0.25 
• Routing Protocol: AODV 
4.3. Simulation Scenarios 
To simulate our result we have taken two scenarios. 
Scenario 1: In this scenario, Watchdog technique is implemented with one malicious node in path 
between source and destination. 
Scenario 2: In this, Proposed Technique is implemented with same parameters taken in scenario 
1. 
4.4. Performance Evaluation 
Scenario 1 
In the first case, watchdog technique is implemented with a malicious node between the source 
and destination. Figure 4 shows the results that it detects the misbehaviour in the network of 10 
nodes in 27.39 sec of neighbour detection. 
Figure 4: Screenshot of Watchdog Technique 
Scenario 2 
In this scenario, proposed Selective Watchdog technique is implemented and then results are 
compared with the results of scenario 1. 
Figure 5 show that it took 27.36 sec for our scheme to detect the intrusion in the network.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
15 
Figure 5: Screenshot of proposed technique 
Figure 6 shows the graph of comparison between the proposed scheme and the watchdog scheme. 
From the graph, it is clearly shown that the proposed scheme performs better than the watchdog 
scheme in terms of detection time to detect the intrusion in the network. 
Figure6 Detection Time Comparison of proposed scheme and watchdog scheme 
• Quantitative Analysis 
For a network of n nodes, Watchdog scheme have n-2 promiscuous listening. As every node have 
to monitor its next neighbour except the source which is not monitored by any node and the 
destination which will not monitor any node?
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
For our proposed Selective Watchdog scheme, each cluster is of size say l, suppose we break the 
network of n nodes into K number of Clusters where K<<n i.e. n/l. 
Let say a threshold value of T qualifies n/l*1/t, where t is a qualifier and its value will determine 
the number of clusters to be checked. 
Promiscuous listening in a cluster of size l would be (l-2) in case both source and destination are 
included in the cluster and it would be l in other cases. 
16 
Total promiscuous listening in proposed study is l*(nl-2) + 2*(l-2) 
This formula calculates the number of promiscuous listening and it is for only one data packet. 
Varying the number of cluster size and number of nodes taken, we can get different number of 
promiscuous listening. 
Table 1 shows the different values taken using the above formula. For n=12,l=3,the number of 
promiscuous listening in Watchdog technique is 10 and in proposed technique is 8.Similarly,for 
other values shown in table , number of promiscuous listening is calculated. 
Table 1. Promiscuous listening with varying number of nodes and cluster size 
N=12 N=24 N=36 
L=3 8 20 32 
L=4 7 16 25 
L=6 8 14 20 
Watchdog 
10 22 34 
Technique 
Figure 7 shows the graph for number of promiscuous listening for the proposed approach and the 
watchdog technique, plotted using the data provided in the table 1. The graph is plotted by 
varying the number of nodes and the size of cluster taken for each case. 
Figure 7 Number of nodes Vs Promiscuous Listening for proposed scheme
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
17 
• Experimental Analysis 
Number of nodes and size of cluster is varied and values are calculated by simulation. Table 2 
shows the result of simulation. 
Table 2. Experimental value of promiscuous listening 
N 
12 
N 
24 
N 
36 
L=3 238 580 900 
L=4 234 536 779 
L=6 220 448 589 
Watchdog 
Technique 
1109 2230 3689 
From these values, the graph is plotted. Figure 8 show the graph plotted using the above values. 
Figure 8 Number of nodes vs. Promiscuous listening 
Table 3 shows the statistics of the number of packets sent, number of packets received and 
percentage of packets received and drop in all three scenarios i.e. in absence of malicious node, in 
its presence without IDS and with IDS. The statistics shows that with the presence of IDS in the 
network, the network performance gets improved.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
18 
Table 3: Statistics of simulation data 
5. CONCLUSION 
Security is the major concern in the ad-hoc networks as nodes can be easily captured or 
compromised. Black-hole attack drops all the packets going through the malicious node. As a 
result network performance decrease drastically. The proposed scheme detects the intrusion in the 
presence of black-hole attack in the network and then routes the packets through secured path. 
The results obtained in various test scenarios suggest that proposed selective technique is better 
than conventional Watchdog technique in terms of time to detect the intrusion and number of 
promiscuous listening amongst the neighbours. The threshold reference removes many 
promiscuous listening as a big set of node lying under the value are not subjected to any detection 
related messages listening and associated networking cost. The graphs further show that making 
the cluster and starting the IDS only when acknowledgement not received further improves the 
network throughput as there would be further less network overhead. The proposed technique 
scales well with the increase in network size as shown in result graphs. A mathematical model 
capturing the costs discussed in the paper has been presented with results matching the 
experimental data. 
REFERENCES 
[1] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in 
Wireless/Mobile Security. New York: Springer-Verlag, 2008 
[2] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system 
,”, Journal of computer security,1999,pp.37-71. 
[3] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., 
College Station, TX, 2004. 
[4] David Wagner and Paolo Soto ,”Mimicry Attacks on Host-Based Intrusion Detection Systems”,in 
ACM, Nov.2002 
[5] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection 
system,”, Journal of computer security,1999,pp.37-71.
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks 
(GRAPH-HOC) Vol.6, No.3, September 2014 
[6] D. Sterne1, P. Balasubramanyam2, D. Carman1, B. Wilson1,R. Talpade3, C. Ko1,R. Balupari1, C-Y. 
Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 "A General Cooperative Intrusion Detection 
Architecture for MANETs. 
[7] Arun Kumar. R, Abhishek M. K et.al. ,”A Review on Intrusion Detection Systems in MANET,”,in 
International Journal of Engineering Science and Innovative Technology,vol.2,pp 609-618,March 
2013 
[8] Deepika Dua and Atul Mishra , “Intrusion Detection in Mobile Ad-hoc Network, “ in International 
19 
Journal of Advanced Research in Computer and Communication Engg. ,vol.2,no.2,pp.5691-5694. 
[9] S. Marti, T.J.Giuli, K.Lai, and M.Baker,”Mitigating routing misbehavior in mobile ad hoc 
networks,”in Proc. 6Th Annu.Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp.255-265. 
[10] K.Liu, J.Deng, P.K.Varshney, and K.Balakrishnan , “An acknowledgment-based approach for the 
detection of routing misbehaviour in MANETs,”IEEE Trans Mobile Comput.,vol.6,no.5,pp.536-550 
,May 2007 
[11] T.Sheltami et al. “AACK:Adaptive Acknowledgment Intrusion Detection for Manet with Node 
detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information 
Networking and Applications,2010,pp 634-640 
[12] N.Nasser and Y.Chen,”Enhanced Intrsuion detection system for discovering mailicious nodes in 
mobile ad hoc network,”in Proc.IEEE Int. Conf. Commun.,Glasgow,Scotland,Jun. 24-28 ,2007 , 
pp.1154-1159 
[13] Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami“EAACK-A Secure Intrusion-Detection System 
for MANET's”,in Proc. IEEE Transactions On Industrial Electronics,Vol 60,No.3,March 2013,pp 
1089-1098 
Authors 
Deepika Dua1 received her Mtech (Computer Engineering-networking) from YMCA 
University of Science and Technology, Faridabad in the year 2014.Her research interests 
include mobile ad-hoc networks. 
Atul Mishra2 is working as an Associate Professor in the Department. of Computer 
Engineering, YMCA University of Science and Technology, Haryana, India. He holds a 
Masters Degree in Computer Science and Technology, from University of Roorkee (now IIT, 
Roorkee) and obtained his PhD in Computer Science and Engg. from MD University, 
Rohtak. He has about 16 years of work experience in the Optical Telecommunication 
Industry specializing in Optical Network Planning and Network Management tools development. His 
research interests include Cloud Computing, SOA, Network Management & Mobile Agents.

More Related Content

What's hot

Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...ijwmn
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 

What's hot (17)

Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
50120140507006
5012014050700650120140507006
50120140507006
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
B43040610
B43040610B43040610
B43040610
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
 
Grayhole
GrayholeGrayhole
Grayhole
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
GEOGRAPHIC INFORMATION-BASED ROUTING OPTIMIZATION USING GA FOR CLUSTER-BASED ...
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 

Viewers also liked

A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
 
Watchdog journalism
Watchdog journalism Watchdog journalism
Watchdog journalism Dale Cressman
 
Fabric, Cuisine and Watchdog for server administration in Python
Fabric, Cuisine and Watchdog for server administration in PythonFabric, Cuisine and Watchdog for server administration in Python
Fabric, Cuisine and Watchdog for server administration in PythonFFunction inc
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

Viewers also liked (9)

A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
Watchdog journalism
Watchdog journalism Watchdog journalism
Watchdog journalism
 
Fabric, Cuisine and Watchdog for server administration in Python
Fabric, Cuisine and Watchdog for server administration in PythonFabric, Cuisine and Watchdog for server administration in Python
Fabric, Cuisine and Watchdog for server administration in Python
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 

Similar to Selective watchdog technique for intrusion detection in mobile ad hoc network

SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKFransiskeran
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 

Similar to Selective watchdog technique for intrusion detection in mobile ad hoc network (20)

SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORKSELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
50120140507006
5012014050700650120140507006
50120140507006
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
560 229-237
560 229-237560 229-237
560 229-237
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Selective watchdog technique for intrusion detection in mobile ad hoc network

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK DEEPIKA DUA AND ATUL MISHRA Department of Computer Engineering, YMCA University of Science & Technology, Haryana, India ABSTRACT Mobile ad-hoc networks(MANET) is the collection of mobile nodes which are self organizing and are connected by wireless links where nodes which are not in the direct range communicate with each other relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious node can easily compromise the security of the network. A black-hole node is the malicious node which drops the entire packet coming to it and always shows the fresh route to the destination, even if the route to destination doesn't exist. This paper describes a scheme that will detect the intrusion in the network in the presence of black-hole node and its performance is compared with the previous technique. This novel technique helps to increase the network performance by reducing the overhead in the network. KEYWORDS MANET, Intrusion, Intrusion Detection system, Attacks 1. INTRODUCTION Mobile ad-hoc network is formed by the collection of some mobile nodes which can act both as a sender as well as receiver for data communication. They are decentralized networks which are self organizing and self maintaining. There is no fixed infrastructure in the network, the topology changes dynamically [1]. As a result of continuously changing topology, there is no fixed boundary of the network. The nodes cooperate with each other to forward the data packet. In such a network where there is no well-defined boundary, open medium, nodes rely on one other to forward the data packet, firewalls cannot be applied for securing these networks. Intrusion detection system [2] is used in these networks to detect the misbehaviour in the network. Intrusion detection system acts as a second layer in mobile ad-hoc networks [3]. Intrusion detection system can be network based [4] or host based [5] on the basis of the audit data collection or it can be signature based, anomaly based or specification based on the basis of the detection technique [6]. In this paper, a scheme is proposed which detects the misbehaving nodes in the network in the presence of black-hole attack [7] [8] and reduces the network overhead. Rest of the paper is organized as follows. In section 2, literature survey is presented. In section 3, scheme description is present, the methodology used is described. In section 4, simulation environment and results of the simulation are presented. And finally conclusion is presented in DOI:10.5121/jgraphoc.2014.6302 7
  • 2. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 8 section5. 2. RELATED WORK Marti el al [9] proposed a scheme named Watchdog which is a reputation based scheme [10], in which after detecting the malicious node, information is propagated throughout the network so to avoid that node in future routes. The watchdog scheme works in two parts-in the first part the watchdog detects the malicious node by promiscuously listening to its next neighbour’s transmission. If a node doesn't forward the packet after a threshold, then watchdog declares that node as malicious. And then the path rater finds the new route to the destination excluding that malicious node. In this scheme malicious node is detected instead of malicious link there are six weaknesses that are mentioned by Marti [9]. They are 1)Receiver Collision problem 2)Ambiguous collision 3)Limited Transmission power 4) False misbehaviour 5) collusion 6) Partial Dropping. Liu at al [10] proposed a scheme named TWOACK, which detects the misbehaving links in the ad-hoc network instead of misbehaving nodes. It is an acknowledgement based scheme in which every third node in the route from sender to receiver requires to send an acknowledgement packet to the first node down the reverse route. Figure 1.TWOACK In figure 1, node Q sends a packet to node R which further forwards it to node S. When node S receives the packet and as it is third node in the path, it will send a TWOACK packet to the node Q acknowledging that it receives the packet successfully. All the nodes in the path work in the similar way. It solves the receiver collision problem and limited power problem of the watchdog scheme. But due to the exchange of too many acknowledgement packets, this scheme consumes too much battery power and hence can degrade the network performance. It works on DSR (Dynamic source routing) protocol. Sheltami et al. [11] proposed a scheme named Adaptive acknowledgment (AACK) which is based on TWOACK scheme. This scheme also works on DSR routing protocol. It is an advancement of the TWOACK scheme. It reduces the battery consumption by making the scheme a combination of end-to-end acknowledgement and TACK, which is similar to TWOACK. When the sender sends a data packet to destination, it waits for some time for the destination to acknowledge that data packet, but if the acknowledgement doesn't come within per-defined time, then it switches to TACK mode, where every third node sends the TACK packet to the nodes two hops away from it down the route.
  • 3. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 9 Figure 2: ACK scheme Figure 2 shows the ack scheme in which source P waits for the destination T to acknowledge the data packet. If acknowledgment from T doesn’t receive within specified time, then it switches to TACK mode by sending TACK packet. Nidal Nasser and Yunfeng Chen [12] proposed an approach called Ex-Watchdog. It was basically an improvement over the Watchdog scheme proposed by Marti [9].Out of the six weaknesses mentioned in the Watchdog [9] scheme it solves the false misbehaviour problem. In this scheme, each node maintains a table having entries of source address, destination address, and the statistics of the packets received, forwarded and stored. If any node reports a node as being misbehaving, then instead of trusting that node immediately, a new route to destination is found excluding the reported malicious node and number of packets received is checked at the destination node. If it is equal to the number of packets sent, then it is a false misbehaviour report and whosoever generated is declared as malicious .Then, pathrater or routeguard cooperated with the routing protocol and update the rating of node in their corresponding tables. This scheme fails to detect the misbehaviour when the misbehaving node is in all the routes from source to destination. Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami [13] proposed an approach called EAACK (Enhanced AACK) which solves receiver collisions problem, limited battery problem and false misbehaviour problem of the watchdog scheme. It is also an acknowledgement based scheme and to protect the acknowledgement packet from forging, this scheme makes use of digital signature. It is composed of three parts:- ACK- It is an end-to-end acknowledgement as described in AACK scheme. Sender waits for the destination to acknowledge data packets but if the acknowledgement doesn't come within a specified time, then it switches to S-ACK mode. S-ACK- In this mode, similar to TWOACK scheme, consecutive node works in a group i.e. every third node sends an S-ACK packet to its first node which is in the reverse directions. The difference between the S-ACK and TWOACK is that TWOACK immediately trusts the misbehaviour report and declares the node as malicious. But in this scheme, we switch to MRA mode to confirm the misbehaviour report. MRA- It stands for misbehaviour report authentication. This mode cooperates with the routing protocol to find a new route to the destination which excludes the reported misbehaviour node. Destination is checked for the data packet using the new route. If the data packet is found at the destination, then it is a false misbehaviour report and the node which generated this report will be declared as malicious, else the misbehaviour report is trusted and the node would be declared as misbehaving.
  • 4. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 10 3. PROPOSED APPROACH We proposed an algorithm that detects the intrusion in the presence of black hole node in the network. The proposed technique is an improvement over the Watchdog technique[9].In Watchdog each node continuously hears its next node transmission but in the proposed selective Watchdog technique only when the acknowledgment would not be received ,then IDS would start.Morever,in watchdog[9] technique all nodes monitor their neighbours but in proposed selective watchdog technique ,network of nodes are divided into clusters and only nodes in the cluster which have value greater than threshold monitor their neighbours. The pseudo code for the black-hole attack is shown in the algorithm. The input parameters for the algorithm are set of all the nodes, a threshold value which gets updated dynamically, source node, destination node and all the nodes which send the route reply to the source node. The algorithm works as follows:- The source waits for the destination to send acknowledgement to it after every 10th packet. If source receives the acknowledgement, then there is no misbehaviour in the network and process continues as such. But if the destination fails to acknowledge the data packets for a time period, then IDS starts its functionality. As in black-hole attack, there is a greater possibility that black-hole node will send the highest sequence number to the source in route reply. The proposed IDS algorithm maintains the list of all the nodes which send the route reply to the source with sequence number greater than the threshold value. The IDS will be applied only on those nodes which are in the list maintained by ids. Algorithm 1: Algorithm for detecting IDS Input: Threshold_seq_no. Set_of_all_nodes; Set_of_nodes_who_sent_route_reply; source; destination.
  • 5. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 11 1. Begin 2. If(pkt_received_by_dest==pkt_sent_by_source) then 3. network does not shows any malicious behaviour 4. Else if(pkt_received_by_dest < certain percentage of pkt sent by source over the network) 5. { 6. Then the network shows malicious behaviour and IDS is applied to detect malicious behaviour 7. For(int i=0; i<no._of_nodes_who_sent_route_reply; i++) 8. { 9. If(seq_no[route_reply[Node]] > Threshold_seq_no) then 10. List. add(next[Node]) 11. List. add(Node) 12. List. add(prev[Node]) 13. result= Segment_watchdog(List); 14. If(result==true) then //(i.e. if malicious node is found) 15. Exit; 16. ENDIF 17. Else 18. Continue 19. EndElse 20. } 21. } Algorithm: Segmented_Watchdog (List) 1. BEGIN 2. Result=false 3. malicious= Null 4. Node1= list. get(0) 5. Node2= list. get(1) 6. Node3=list. get(2) 7. //Chk(Sent_pkt[Node2]); 8. If(sent_pkt[Node2] == Received_pkt_by_node2) THEN 9. Monitor Node3 10. ENDIF 11. If(Sent_pkt_by_Node3==Received_pkt_by_Node3) THEN 12. No malicious activity detected in this segment 13. RETURN Result 14. END IF 15. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 16. Malicious= Node1 17. Result= True 18. RETURN Result 19. END ELSEIF 20. Else if(Sent_pkt_by_Node2 < Received_pkt_by_Node2) THEN 21. Malicious= Node2 22. Result=True 23. RETURN Result 24. END ELSEIF 25. Else if(Sent_pkt_by_Node1 < Received_pkt_by_Node1) THEN 26. Malicious= Node1 27. Result=True 28. RETURN Result 29. END ELSEIF 30. END
  • 6. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 For every node in the list, segment watchdog method gets called. In this method, the number of packets send and received by the node is checked. If number of send and received are equal, then its successor node in the route is checked else its predecessor node in the route is evaluated in the same way. 12 The Flowchart of the technique is shown in figure3 Figure 3(a). Flowchart of proposed technique
  • 7. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 13 Figure 3(b). Flowchart of selective Watchdog 4. SIMULATION RESULTS 4.1. Assumptions • We have assumed the bi-directionality in the links. • Secondly, we have assumed that both the sender and receiver are trusted nodes, i.e. they are non-malicious. • Duplicate MAC address doesn't exist. • Lastly we have assumed that the nodes can overhear the transmission of their immediate neighbours. 4.2. Simulation Configuration The Simulation is carried out using the tool Network Simulator 2 (NS-2) version 2.35 on Linux operating system Ubuntu version 12.10.The system runs on a laptop with Core 2 Duo T6500 processor with 4-GB RAM. For plotting graph, trace-graph version 202 is used. • Grid Size: 500x500
  • 8. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 14 • Number of Nodes: 10 of which 5 were communicating • Packet traffic: CBR (Constant bit rate) on UDP • Packet Size: 512B • Packet Interval: 0.25 • Routing Protocol: AODV 4.3. Simulation Scenarios To simulate our result we have taken two scenarios. Scenario 1: In this scenario, Watchdog technique is implemented with one malicious node in path between source and destination. Scenario 2: In this, Proposed Technique is implemented with same parameters taken in scenario 1. 4.4. Performance Evaluation Scenario 1 In the first case, watchdog technique is implemented with a malicious node between the source and destination. Figure 4 shows the results that it detects the misbehaviour in the network of 10 nodes in 27.39 sec of neighbour detection. Figure 4: Screenshot of Watchdog Technique Scenario 2 In this scenario, proposed Selective Watchdog technique is implemented and then results are compared with the results of scenario 1. Figure 5 show that it took 27.36 sec for our scheme to detect the intrusion in the network.
  • 9. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 15 Figure 5: Screenshot of proposed technique Figure 6 shows the graph of comparison between the proposed scheme and the watchdog scheme. From the graph, it is clearly shown that the proposed scheme performs better than the watchdog scheme in terms of detection time to detect the intrusion in the network. Figure6 Detection Time Comparison of proposed scheme and watchdog scheme • Quantitative Analysis For a network of n nodes, Watchdog scheme have n-2 promiscuous listening. As every node have to monitor its next neighbour except the source which is not monitored by any node and the destination which will not monitor any node?
  • 10. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 For our proposed Selective Watchdog scheme, each cluster is of size say l, suppose we break the network of n nodes into K number of Clusters where K<<n i.e. n/l. Let say a threshold value of T qualifies n/l*1/t, where t is a qualifier and its value will determine the number of clusters to be checked. Promiscuous listening in a cluster of size l would be (l-2) in case both source and destination are included in the cluster and it would be l in other cases. 16 Total promiscuous listening in proposed study is l*(nl-2) + 2*(l-2) This formula calculates the number of promiscuous listening and it is for only one data packet. Varying the number of cluster size and number of nodes taken, we can get different number of promiscuous listening. Table 1 shows the different values taken using the above formula. For n=12,l=3,the number of promiscuous listening in Watchdog technique is 10 and in proposed technique is 8.Similarly,for other values shown in table , number of promiscuous listening is calculated. Table 1. Promiscuous listening with varying number of nodes and cluster size N=12 N=24 N=36 L=3 8 20 32 L=4 7 16 25 L=6 8 14 20 Watchdog 10 22 34 Technique Figure 7 shows the graph for number of promiscuous listening for the proposed approach and the watchdog technique, plotted using the data provided in the table 1. The graph is plotted by varying the number of nodes and the size of cluster taken for each case. Figure 7 Number of nodes Vs Promiscuous Listening for proposed scheme
  • 11. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 17 • Experimental Analysis Number of nodes and size of cluster is varied and values are calculated by simulation. Table 2 shows the result of simulation. Table 2. Experimental value of promiscuous listening N 12 N 24 N 36 L=3 238 580 900 L=4 234 536 779 L=6 220 448 589 Watchdog Technique 1109 2230 3689 From these values, the graph is plotted. Figure 8 show the graph plotted using the above values. Figure 8 Number of nodes vs. Promiscuous listening Table 3 shows the statistics of the number of packets sent, number of packets received and percentage of packets received and drop in all three scenarios i.e. in absence of malicious node, in its presence without IDS and with IDS. The statistics shows that with the presence of IDS in the network, the network performance gets improved.
  • 12. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 18 Table 3: Statistics of simulation data 5. CONCLUSION Security is the major concern in the ad-hoc networks as nodes can be easily captured or compromised. Black-hole attack drops all the packets going through the malicious node. As a result network performance decrease drastically. The proposed scheme detects the intrusion in the presence of black-hole attack in the network and then routes the packets through secured path. The results obtained in various test scenarios suggest that proposed selective technique is better than conventional Watchdog technique in terms of time to detect the intrusion and number of promiscuous listening amongst the neighbours. The threshold reference removes many promiscuous listening as a big set of node lying under the value are not subjected to any detection related messages listening and associated networking cost. The graphs further show that making the cluster and starting the IDS only when acknowledgement not received further improves the network throughput as there would be further less network overhead. The proposed technique scales well with the increase in network size as shown in result graphs. A mathematical model capturing the costs discussed in the paper has been presented with results matching the experimental data. REFERENCES [1] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: Springer-Verlag, 2008 [2] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system ,”, Journal of computer security,1999,pp.37-71. [3] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004. [4] David Wagner and Paolo Soto ,”Mimicry Attacks on Host-Based Intrusion Detection Systems”,in ACM, Nov.2002 [5] Giovanni Vigna and Richard A. Kemmerer, “NetSTAT: A network-based intrusion detection system,”, Journal of computer security,1999,pp.37-71.
  • 13. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) Vol.6, No.3, September 2014 [6] D. Sterne1, P. Balasubramanyam2, D. Carman1, B. Wilson1,R. Talpade3, C. Ko1,R. Balupari1, C-Y. Tseng2, T. Bowen3, K. Levitt2 and J. Rowe2 "A General Cooperative Intrusion Detection Architecture for MANETs. [7] Arun Kumar. R, Abhishek M. K et.al. ,”A Review on Intrusion Detection Systems in MANET,”,in International Journal of Engineering Science and Innovative Technology,vol.2,pp 609-618,March 2013 [8] Deepika Dua and Atul Mishra , “Intrusion Detection in Mobile Ad-hoc Network, “ in International 19 Journal of Advanced Research in Computer and Communication Engg. ,vol.2,no.2,pp.5691-5694. [9] S. Marti, T.J.Giuli, K.Lai, and M.Baker,”Mitigating routing misbehavior in mobile ad hoc networks,”in Proc. 6Th Annu.Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp.255-265. [10] K.Liu, J.Deng, P.K.Varshney, and K.Balakrishnan , “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,”IEEE Trans Mobile Comput.,vol.6,no.5,pp.536-550 ,May 2007 [11] T.Sheltami et al. “AACK:Adaptive Acknowledgment Intrusion Detection for Manet with Node detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information Networking and Applications,2010,pp 634-640 [12] N.Nasser and Y.Chen,”Enhanced Intrsuion detection system for discovering mailicious nodes in mobile ad hoc network,”in Proc.IEEE Int. Conf. Commun.,Glasgow,Scotland,Jun. 24-28 ,2007 , pp.1154-1159 [13] Elhadi M. Shashuki, Nan Kang and Tarek R. Sheltami“EAACK-A Secure Intrusion-Detection System for MANET's”,in Proc. IEEE Transactions On Industrial Electronics,Vol 60,No.3,March 2013,pp 1089-1098 Authors Deepika Dua1 received her Mtech (Computer Engineering-networking) from YMCA University of Science and Technology, Faridabad in the year 2014.Her research interests include mobile ad-hoc networks. Atul Mishra2 is working as an Associate Professor in the Department. of Computer Engineering, YMCA University of Science and Technology, Haryana, India. He holds a Masters Degree in Computer Science and Technology, from University of Roorkee (now IIT, Roorkee) and obtained his PhD in Computer Science and Engg. from MD University, Rohtak. He has about 16 years of work experience in the Optical Telecommunication Industry specializing in Optical Network Planning and Network Management tools development. His research interests include Cloud Computing, SOA, Network Management & Mobile Agents.