17.6 DHGN APPROACH FOR THREAT DETECTION IN MANET

MANET implements a peer-to-peer multihop concept for supporting node mobility. It has neither fixed communications infrastructure nor any base stations [7]. Figure 17.45 shows the conceptual diagram of a typical MANET. There are quite a number of threats faced within MANETs. These threats are closely related to attacks on the WSN. Being a subset of wireless networks, MANETs are exposed to all the attacks experienced by of the wireless networks. Table 17.3 shows some of the attacks on MANETs according to the protocol stacks (adopted from [13]).

images

Figure 17.45 A typical MANET representation.

Intrusion detection is one of the countermeasures that may be used in MANETs. One of the important concepts in MANET-based IDS is the cooperation enforcement [13]. In cooperation enforcement, each mobile node is made aware of some of the misbehaving nodes. This gives rise to the self-aware state where the network must be able to recognize any changes in its state. IDS implementations such as Watchdog and Pathrater [14] use self-aware approaches to detect any changes in the behavior of the nodes.

Table 17.3 Security attacks on protocol stacks [13]

Layer Attacks
Application Repudiation, data corruption
Transport Session hijacking, SYN flooding
Network Wormhole, blackhole, Byzantine, flooding, resource consumption, location disclosure attacks ...

Get Mobile Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.