Você está na página 1de 2

ENERGY EFFICIENT ROUTING IN MOBILE NETWORKS (MANETs)

SECURE ADHOC

Student: Plt Off Shoaib Khalil Advisor: Wg Cdr Nauman Mazhar

Introduction/Abstract Characteristically mobile ad hoc networks are known for their dynamic, decentralized topology with inherent insecurity of the network due to faulty or malicious nodes. Aiming for a catch at such routing misbehavior, innovative ideas are mapped according to the desired goal. This is a research based project with a vision of designing an Artificial Immune System (AIS), designated to specifically detect packet dropping misbehavior of the nodes, with BeeAdHoc routing protocol as the case study. Design of the AIS is based upon the negative selection algorithm, as in the natural immune system. Furthermore elaboration of pinning the natural immune system concepts such as antigens, antibodies and detectors to a mobile ad hoc network are described, resulting in a detection system for computer networks. The simulations are carried out in ns-2.

Figure 1: Working of AIS


Objective The aim of the project is to detect packet dropping attacks in a MANET using BeeAdHoc routing protocol. Methodology Implementation of BeeAdHoc in ns-2.29. Simulations of packet dropping attacks against BeeAdHoc protocol in ns-2.29. Study and understanding of AIS for anomaly detection in MANETs. Implementation of AIS based security scheme for BeeAdHoc protocol to detect packet dropping attacks. Routing attack generation for testing of implemented AIS. Analysis BeeAdHoc routing protocol is vulnerable to various routing attacks which is one of the causes in bringing down the overall network communication. Mimicking the natural immune system, an Artificial immune system for detection of packet dropping attacks has been designed. Non-inherent to ns-2, promiscuous mode had been enabled for over hearing the network traffic in order to collect the desired data in accordance with the events defined. Offline analysis for the testing of designed system successfully results in the production of the antigens during learning phase,detectors during negative selection phase and finally detection of the malacious node during detection phase. Conclusion The project was successfully completed and following deliverables were achieved: Implementation of BeeAdHoc protocol in ns-2.29. Simulation of packet dropping attacks against BeeAdHoc routing protocol. Development of AIS to detect packet dropping attacks against BeeAdHoc routing protocol. Enabling the promiscuous mode in ns-2. Offline analysis of the designed AIS for successful detection.

Figure 2: A simple Mobile Ad hoc Network with BeeAdHoc and AIS implemented on each computer

AVIONICS ENGINEERING DEPARTMENT

Você também pode gostar