Intrusion detection mechanisms in mobile ad hoc network

Watchdog fails to detect the malicious nodes in the presence of ambiguous collisions, receiver collisions, limited transmission power, false misbehavior report, collusion and partial dropping. TWOACK is a mechanism that solves the receiver collision and limited transmission power problems ion watchdog. It acknowledges every data packet transmitted over every three consecutive nodes in the destination direction. Adaptive ACKnowledgement (AACK) scheme is a combination of TWOACK and an end-to-end acknowledgement scheme called ACKnowledge (ACK). In AACK scheme, the source node is expected to receive the acknowledgement from the destination within a predefined time. Both the TWOACK and AACK considerably reduce the network overhead and these schemes fails to detect the malicious nodes in the presence of a false misbehavior report and forged acknowledgment packets. Enhanced Adaptive ACKnowledgment (EAACK) overcomes the six weaknesses of watchdog mechanism, namely, false misbehavior, limited transmission power, and receiver collision. EAACK achieves this with three parts, namely, ACK, secure ACK (S-ACK), and misbehavior report authentication (MRA).

Solution in NS2

  • False misbehavior report generation is modeled in the network using attacker.

  • Each sequence of the detection mechanism can be executed by writing procedure for each sequence of EAACK (ACK, S-ACK, and MRA).

Related Titles:

  • Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs” IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013.