Advertisement

Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, worm hole, mad in the middle etc. Several Intrusion detection systems (IDS) have been proposed which successfully detect these attacks. Among these IDSs signature based and anomaly based are simple in nature but generate false alarms. To cater to this issue, recently specification based IDS is proposed for WSNs which have low false alarms yet detect most of the attacks. Lots of works have been reported on enhancement of AODV to improve throughput, PDR, NRO, End to End delay, power etc. Power Aware AODV (POW-AODV), enhances WNSs from the perspective of lifetime of nodes (in terms of power). In this paper we show that POW-AODV gets subject to more vulnerability, compared to AODV, in the effort to reduce power. Such attacks reduce life time of nodes instead of increasing them. Following that we propose a specification based IDS for this protocol to detect these vulnerabilities.

Keywords

Wireless Sensor Network Ad-Hoc on Demand routing protocol Fault-Tolerance 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stankovic, J.: Wireless Sensor Networks. In: Handbook of Real-Time and Embedded Systems. CRC (2007)Google Scholar
  2. 2.
    Lewis, F.L.: Wireless sensor networks. In: Cook, D.J., Das, S.K. (eds.) Smart Environments: Technologies, Protocols and Applications. Wiley, New York (2004)Google Scholar
  3. 3.
    Patwardhan, A., Parker, J., Joshi, A., Karygiannis, A., Iorga, M.: : Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Third IEEE International Conference on Pervasive Computing and Communications (April 2005)Google Scholar
  4. 4.
    On-demand distance vector (AODV) routing, RFC 3561 (2003)Google Scholar
  5. 5.
    Roesch, M.: Snort-lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX System Administration Conference, pp. 229–238. USENIX Association (1999)Google Scholar
  6. 6.
    Chandol, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Survey 41(3), 1–58 (2009)CrossRefGoogle Scholar
  7. 7.
    Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, pp. 125–134 (2003)Google Scholar
  8. 8.
    Alshanyour, A.M., Baroudi, U.: Bypass AODV: improving performance of ad hoc on-demand distance vector (AODV) routing protocol in wireless ad hoc networks. In: Proceedings of the 1st International Conference on Ambient Media and Systems, pp. 17:1–17:8 (2008)Google Scholar
  9. 9.
    Liu, J., Li, F.-M.: An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. In: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, vol. 01, pp. 507–510 (2009)Google Scholar
  10. 10.
    Chen, D., Wang, X.: AODV with lower routing overhead. In: Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2649–2652 (April 2009); Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, Heidelberg (1996)MATHGoogle Scholar
  11. 11.
    Sethi, S., Udgata, S.K.: SRMAODV: a scalable reliable MAODV for MANET. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 368–373 (2010)Google Scholar
  12. 12.
    Bharathi, V., Poongkuzhali, T.: A Performance Enhancement of an Optimized Power Reactive Routing based on AODV Protocol for Mobile AD-HOC Network. International Journal of Technology and Engineering System 2(1), 39–45 (2011)Google Scholar
  13. 13.
    Tan, C.-W., Bose, S.K.: Modifying AODV for Efficient Power-Aware Routing in MANETs. In: IEEE TENCON, pp. 1–6 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Dept of CSEUniversity of KalyaniNadiaIndia
  2. 2.Dept of CAGIMTGuwahatiIndia

Personalised recommendations