Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

FSM based Intrusion Detection of Packet Dropping Attack using Trustworthy Watchdog Nodes

Author(s): Radha Raman Chandan* and P.K Mishra

Volume 14, Issue 9, 2021

Published on: 30 July, 2020

Page: [2817 - 2827] Pages: 11

DOI: 10.2174/2666255813999200730223837

Price: $65

conference banner
Abstract

Introduction: The proposed TWIST model aims to achieve a secure MANET by detecting and mitigating packet dropping attack using a finite state machine based IDS model.

• To determine the trust values of the nodes using context-aware trust calculation

• To select the trustworthy nodes as watchdog nodes for performing intrusion detection on the network

• To detect and isolate the packet dropping attackers from routing activities, the scheme uses FSM based IDS for differentiating the packet dropping attacks from genuine nodes in the MANET.

Methods: In this methodology, instead of launching an intrusion detection system (IDS) in all nodes, an FSM based IDS is placed in the trustworthy watchdog nodes for detecting packet dropping attacker nodes in the network. The proposed FSM based intrusion detection scheme has three steps. The three main steps in the proposed scheme are context-aware trust calculation, watchdog node selection, and FSM based intrusion detection. In the first process, the trust calculation for each node is based on specific parameters that are different for malicious nodes and normal nodes.

The second step is the watchdog node selection based on context-aware trust value calculation for ensuring that the trustworthy network monitors are used for detecting attacker nodes in the network. The final process is FSM based intrusion detection, where the nodes acquire each state based on their behavior during the data routing. Based on the node behavior, the state transition occurs, and the nodes that drop data packets exceeding the defined threshold are moved to the malicious state and restricted to involve in further routing and services in the network.

Results: The performance of the proposed (TWIST) mechanism is assessed using the Network Simulator 2 (NS2). The proposed TWIST model is implemented by modifying the Ad-Hoc On-Demand Distance Vector (AODV) protocol files in NS2. Moreover, the proposed scheme is compared with Detection and Defense against Packet Drop attack in the MANET (DDPD) scheme.

A performance analysis is done for the proposed TWIST model using performance metrics such as detection accuracy, false-positive rate, and overhead and the performance result is compared with that of the DDPD scheme.

After comparing the results, we analyzed that the proposed TWIST model exhibits better performance in terms of detection accuracy, false-positive rate, energy consumption, and overhead compared to the existing DDPD scheme.

Discussion and Conclusion: In the TWIST model, an efficient packet dropping detection scheme based on the FSM model is proposed that efficiently detects the packet dropping attackers in the MANET. The trust is evaluated for each node in the network, and the nodes with the highest trust value are selected as watchdog nodes. The trust calculation based on parameters such as residual energy, the interaction between nodes and the neighbor count is considered for determining watchdog node selection. Thus, the malicious nodes that drop data packets during data forwarding cannot be selected as watchdog nodes. The FSM based intrusion detection is applied in the watchdog nodes for detecting attackers accurately by monitoring the neighbor nodes for malicious behavior. The performance analysis is conducted between the proposed TWIST mechanism and the existing DDPD scheme. The proposed TWIST model exhibits better performance in terms of detection accuracy, false-positive rate, energy consumption, and overhead compared to the existing DDPD scheme.

This work may extend the conventional trust measurement of MANET routing, which adopts only routing behavior observation to cope with malicious activity. In addition, the performance evaluation of proposed work under packet dropping attack has not been performed for varying the mobility of nodes in terms of speed. Furthermore, various performance metric parameters like route discovery latency and malicious discovery ratio can be added to evaluate the performance of the protocol in the presence of malicious nodes. This may be considered in future work for the extension of protocol for better and efficient results.

Furthermore, In the future, the scheme will focus on providing proactive detection of packet dropping attacker nodes in MANET using a suitable and efficient statistical method.

Keywords: MANET, AODV, Packet Dropping Attack, Finite State Machine, Intrusion Detection System, Secure Routing.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy