Masterarbeit, 2013
50 Seiten, Note: C
Chapter 1. Introduction
1.1 Mobile Adhoc Network
1.1.1 History of Mobile Adhoc Networks
1.1.2 Overview Of Mobile Adhoc Networks
1.1.3 Adhoc Routing Protocols for MANET
1.1.3.1 Table Driven Protocols
Destination-Sequenced Distance-Vector Routing (DSDV)
Cluster head Gateway Switch Routing (CGSR)
Wireless Routing Protocol (WRP)
1.1.3.2 On demand Protocols
Ad-Hoc On-Demand Distance Vector Routing (AODV)
Dynamic Source Routing (DSR)
1.1.3.3 Hybrid Protocols
Zone Routing Protocol
1.2 Overview of intrusion detection
1.3 Intrusion Detection System
1.3.1 Host based intrusion detection system
1.3.2 Network based intrusion detection system
1.4 Why we need IDS
1.5 IDS Techniques
1.5.1 Anomaly Detection
1.5.2 Misuse Detection or Signature Detection
1.5.3 Target Monitoring
1.5.4 Stealth Probes
1.6 Overview of wormhole attacks
Chapter 2. Review of literature
Chapter 3. Present work
3.1 Scope of Study
3.2 Problem Formulation
3.3 Objective
Chapter 4. Research Methodology
Chapter 5. Result and Discussion
Chapter 6. Conclusion and Future works
Chapter 7. References
The primary research objective is to develop a more efficient and secure Intrusion Detection System (IDS) for Mobile Ad Hoc Networks (MANETs) by shifting the detection mechanism from the network/routing layer to the Media Access Control (MAC) layer to enhance detection speed and reliability against complex threats like wormhole attacks.
1.6 Overview of wormhole Attacks
Wormhole Attack in Manet is one of the effective attacks on routing protocols in which two or more malicious nodes receive packets at one point of the network and transmit them to another location by a wired or wireless tunnel. This attack is very powerful and that the detection of it is very difficult work. This attack is a one kind of a serious threat in wireless networks, especially against many wireless ad-hoc networks and location-based wireless security systems. There is several wormhole detection and Prevention methods in the wireless ad-hoc networks some of them are described in this article [25].
Chapter 1. Introduction: This chapter provides an foundational overview of Mobile Ad Hoc Networks (MANETs), their routing protocols, and the critical need for robust Intrusion Detection Systems (IDS) to counter sophisticated threats like wormhole attacks.
Chapter 2. Review of literature: This chapter surveys existing research on intrusion detection models, highlighting the evolution of security mechanisms and identifying gaps in previous methodologies regarding MANET vulnerability protection.
Chapter 3. Present work: This chapter outlines the research scope, defines the specific problem formulation regarding security at the MAC layer, and sets the research objectives for the proposed IDS.
Chapter 4. Research Methodology: This chapter details the simulation environment (NS-2) and the tools used to model the ad hoc network and test the proposed intrusion detection strategy.
Chapter 5. Result and Discussion: This chapter presents the experimental findings, providing step-by-step screenshots and analyses of the IDS detecting wormhole attacks in a simulated MAC layer environment.
Chapter 6. Conclusion and Future works: This chapter summarizes the research achievements regarding MAC-layer intrusion detection and outlines potential directions for future work to address a broader range of network attacks.
Chapter 7. References: This chapter lists the scholarly articles, books, and resources cited throughout the dissertation.
Mobile Ad Hoc Networks, MANET, Intrusion Detection System, IDS, MAC Layer, Wormhole Attack, Network Security, Routing Protocols, NS-2, Simulation, Anomaly Detection, Signature Detection, Denial of Service, Wireless Security, Packet Dropping
The dissertation focuses on improving network security in Mobile Ad Hoc Networks (MANETs) by implementing an Intrusion Detection System (IDS) specifically at the Media Access Control (MAC) layer rather than the traditional routing layer.
The work primarily addresses serious network threats, with a specific focus on wormhole attacks, where malicious nodes create unauthorized tunnels to disrupt or intercept data traffic.
The main objective is to achieve earlier and more efficient detection of malicious activities and viruses to reduce network workload and improve the overall security posture of MANETs.
The author utilizes a simulation-based methodology, specifically employing the Network Simulator-2 (NS-2) software on an Ubuntu Linux environment, to model network behavior and validate the proposed IDS.
The main section covers an analysis of various MANET routing protocols (Table-driven, On-demand, Hybrid), the theoretical framework of IDS techniques, and the practical implementation and evaluation of a MAC-layer intrusion detector.
The research is best characterized by terms such as MANET, MAC layer, Intrusion Detection System, wormhole attack, NS-2 simulation, and network security.
The author argues that applying IDS at the MAC layer allows for earlier detection of attacks and viruses compared to routing-layer implementations, thereby optimizing performance and response time.
Effectiveness is evaluated by running simulations in NS-2 that generate 10 active mobile nodes, introducing wormhole attack scenarios, and capturing visual snapshots to confirm that the IDS automatically detects and triggers responses to these attacks.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

