Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV
Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, worm hole, mad in the middle etc. Several Intrusion detection systems (IDS) have been proposed which successfully detect these attacks. Among these IDSs signature based and anomaly based are simple in nature but generate false alarms. To cater to this issue, recently specification based IDS is proposed for WSNs which have low false alarms yet detect most of the attacks. Lots of works have been reported on enhancement of AODV to improve throughput, PDR, NRO, End to End delay, power etc. Power Aware AODV (POW-AODV), enhances WNSs from the perspective of lifetime of nodes (in terms of power). In this paper we show that POW-AODV gets subject to more vulnerability, compared to AODV, in the effort to reduce power. Such attacks reduce life time of nodes instead of increasing them. Following that we propose a specification based IDS for this protocol to detect these vulnerabilities.
KeywordsWireless Sensor Network Ad-Hoc on Demand routing protocol Fault-Tolerance
Unable to display preview. Download preview PDF.
- 1.Stankovic, J.: Wireless Sensor Networks. In: Handbook of Real-Time and Embedded Systems. CRC (2007)Google Scholar
- 2.Lewis, F.L.: Wireless sensor networks. In: Cook, D.J., Das, S.K. (eds.) Smart Environments: Technologies, Protocols and Applications. Wiley, New York (2004)Google Scholar
- 3.Patwardhan, A., Parker, J., Joshi, A., Karygiannis, A., Iorga, M.: : Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Third IEEE International Conference on Pervasive Computing and Communications (April 2005)Google Scholar
- 4.On-demand distance vector (AODV) routing, RFC 3561 (2003)Google Scholar
- 5.Roesch, M.: Snort-lightweight intrusion detection for networks. In: LISA 1999: Proceedings of the 13th USENIX System Administration Conference, pp. 229–238. USENIX Association (1999)Google Scholar
- 7.Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, pp. 125–134 (2003)Google Scholar
- 8.Alshanyour, A.M., Baroudi, U.: Bypass AODV: improving performance of ad hoc on-demand distance vector (AODV) routing protocol in wireless ad hoc networks. In: Proceedings of the 1st International Conference on Ambient Media and Systems, pp. 17:1–17:8 (2008)Google Scholar
- 9.Liu, J., Li, F.-M.: An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. In: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, vol. 01, pp. 507–510 (2009)Google Scholar
- 10.Chen, D., Wang, X.: AODV with lower routing overhead. In: Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2649–2652 (April 2009); Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, Heidelberg (1996)MATHGoogle Scholar
- 11.Sethi, S., Udgata, S.K.: SRMAODV: a scalable reliable MAODV for MANET. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 368–373 (2010)Google Scholar
- 12.Bharathi, V., Poongkuzhali, T.: A Performance Enhancement of an Optimized Power Reactive Routing based on AODV Protocol for Mobile AD-HOC Network. International Journal of Technology and Engineering System 2(1), 39–45 (2011)Google Scholar
- 13.Tan, C.-W., Bose, S.K.: Modifying AODV for Efficient Power-Aware Routing in MANETs. In: IEEE TENCON, pp. 1–6 (2005)Google Scholar