TY - GEN
T1 - Enhanced TWOACK based AODV protocol for intrusion detection system
AU - Sayyar, Salman
AU - Khan, Ajmal
AU - Ullah, Farman
AU - Anwar, Hafeez
AU - Kaleem, Zeeshan
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/4/24
Y1 - 2018/4/24
N2 - Mobile ad-hoc network (MANET) is a collection of mobile nodes that wirelessly cooperate with each other without the support of any fix infrastructure and they have different characteristics from wired networks. In such cooperative network, it is essential for one mobile node to support other node in forwarding a packet to its destination. However, due to the open wireless structure of MANETs, routing misbehavior may exist due to the presence of malicious nodes in the network. Malicious nodes may receive data from other nodes but might refuse to share their resources with neighbour nodes. Thus, there is a need to detect the presence of malicious nodes in the network. In this paper, we propose a new intrusion detection protocol, called E-TwoAck scheme, which does not discard the route when a malicious node is detected rather it sends the data packet twice again on the same route and waits for an acknowledgment. Simulation results show that AODV+E-TwoAck outperforms DSR+TWOACK in terms of packet delivery ratio, routing overhead and end to end delay.
AB - Mobile ad-hoc network (MANET) is a collection of mobile nodes that wirelessly cooperate with each other without the support of any fix infrastructure and they have different characteristics from wired networks. In such cooperative network, it is essential for one mobile node to support other node in forwarding a packet to its destination. However, due to the open wireless structure of MANETs, routing misbehavior may exist due to the presence of malicious nodes in the network. Malicious nodes may receive data from other nodes but might refuse to share their resources with neighbour nodes. Thus, there is a need to detect the presence of malicious nodes in the network. In this paper, we propose a new intrusion detection protocol, called E-TwoAck scheme, which does not discard the route when a malicious node is detected rather it sends the data packet twice again on the same route and waits for an acknowledgment. Simulation results show that AODV+E-TwoAck outperforms DSR+TWOACK in terms of packet delivery ratio, routing overhead and end to end delay.
KW - Ad-hoc on Demand Distance Vector (AODV)
KW - Distance Vector Routing (DSR)
KW - Mobile Ad-hoc Networks (MANETs)
KW - Two Acknowledgment scheme (TWOACK)
UR - http://www.scopus.com/inward/record.url?scp=85050977198&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050977198&partnerID=8YFLogxK
U2 - 10.1109/ICOMET.2018.8346444
DO - 10.1109/ICOMET.2018.8346444
M3 - Conference contribution
AN - SCOPUS:85050977198
T3 - 2018 International Conference on Computing, Mathematics and Engineering Technologies: Invent, Innovate and Integrate for Socioeconomic Development, iCoMET 2018 - Proceedings
SP - 1
EP - 4
BT - 2018 International Conference on Computing, Mathematics and Engineering Technologies
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 International Conference on Computing, Mathematics and Engineering Technologies, iCoMET 2018
Y2 - 3 March 2018 through 4 March 2018
ER -