A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs

作者:Sheltami Tarek; Basabaa Abdulsalam; Shakshuki Elhadi*
来源:Journal of Ambient Intelligence and Humanized Computing, 2014, 5(4): 611-620.
DOI:10.1007/s12652-014-0232-0

摘要

In the past, traditional wired networks have been migrated to wireless networks. In addition, the mobility and scalability in wireless networks made them suitable for many applications. One of the most important applications of wireless networks is Mobile Ad-hoc Network (MANET). MANET is defined as an infrastructureless network, which is a self-configuring mobile nodes connected by wireless links. That means nodes in MANETs don%26apos;t need a fixed network infrastructure. Therefore, every node in MANETs works as transceiver and can communicate with other nodes directly or indirectly. They communicate with each other only if both are within the communication range. However, they rely on each other and forward packets when they are out of communication ranges. Most of the proposed MANET protocols assume that all nodes in the network are cooperative, and do not address security issues in MANETs. In open environment, the rapidly changing topology and the decentralization of nodes in MANETs, make it vulnerable for all types of passive and active attacks. On the other hand, the encryption and authentication mechanisms, which are considered as the first line of defense, are no longer sufficient to protect MANETs. Thus, Intrusion Detection Systems (IDSs) are needed to act as a second line of defense to protect the network from such security threats. The traditional wired IDSs that are designed for wired networks cannot be used in MANETs, because MANETs have different features and architecture as compared to traditional wired networks. As a result, there are many IDSs designed especially for MANETs and most of them based on the Watchdog mechanism. In this research, we propose and implement a novel IDS named Adaptive Three Acknowledgements (A3ACKs) designed specifically for MANETs. We study the behavior of the Watchdog technique, and propose a solution for its three significant problems, namely: receiver collision, limited transmission power and collaborative attacks (collusion attack), especially when there are two consecutive collaborative malicious nodes in a path. To demonstrate the feasibility of our proposed system, it is implemented and tested under various scenarios using NS2 simulator. To validate the results achieved, we compared our results with the results of some existing IDSs techniques.