Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29609


Select areas to restrict search in scientific publication database:
6483
Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes
Abstract:
As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Therefore intrusion detection is one of the possible ways in recognizing a possible attack before the system could be penetrated. All in all, techniques for intrusion detection in old wireless networks are not suitable for MANET. In this paper, we classify the architecture for Intrusion detection systems that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANET presented and compared. We then indicate important future research directions.
Digital Object Identifier (DOI):

References:

[1] B. Sun and L. Osborne Young, "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," IEEE Wireless Communications, pp. 56-63. October 2007.
[2] L. Zhou, Z.J. Haas, "Securing ad hoc networks", IEEE Network Magazine Special Issue on Network Security, vol. 13, no. 6, pp. 24-30, Nov/Dec 1999.
[3] Y. Xiao, X. Shen, and D.Z. Du, Wireless/Mobile Network Security, Springer, 2006. Ch.7.
[4] P. Brutch and C. Ko, "Challenges in intrusion detection for wireless adhoc networks," in Proc. 2003 Symposium on Applications and the Internet Workshop, January 2003, pp. 368-373.
[5] Y. Zhang, W. Lee, and Y. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks Journal (ACM WINET), vol. 9, no. 5, pp. 545-556, September 2003.
[6] A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Communications, vol. 11, pp. 48-60, February 2004.
[7] A. Karygiannis, E. Antonakakis, and A. Apostolopoulos, "Detecting critical nodes for MANET intrusion detection systems," in Proc. 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006.
[8] J. Kong, Adaptive Security for Multi-layer Ad Hoc Networks, Special Issue of Wireless Communications and Mobile Computing, John Wiley InterScience Press, 2002.
[9] L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J. Hubaux, and J. Le Boudec, "Self-organization in mobile ad-hoc networks: the approach of terminodes," IEEE Communications Magazine, vol. 39, no. 6, pp. 166- 174, 2001.
[10] Y. Zhang, and W. Lee, "Intrusion detection in wireless ad-hoc networks," in Proc. 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 2000, pp. 275-283.
[11] N. Komninos, D. Vergados, and C. Douligeris, "Detecting unauthorized and compromised nodes in mobile ad hoc networks," Elsevier Ad hoc network, vol. 5, no. 3, pp. 289-298, 2007.
[12] P. Kyasanur, and N. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," Int. Conf. on Dependable Systems and Networks (DSN-03), 2003, pp. 173-182.
[13] Y. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proc. 22th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-03), Pittsburgh, PA, USA, vol. 3, 2003, pp. 1976-1986.
[14] P. Papadimitratos, Z.J. Haas, and E.G. Sirer, "Path set selection in mobile ad hoc networks," in Proc. 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 2002, pp. 1-11.
[15] B. Sun, W. Kui, and U.W. Pooch, "Towards adaptive intrusion detection in mobile ad hoc networks," in Proc. IEEE Global Telecommunications Conference (GLOBECOM-04), Beaumont, TX, USA, vol. 6, 2004, pp. 3551-3555.
[16] M. K. Rafsanjani, A. Movaghar, "Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes," in Proc. 3rd IEEE Int. Symposium on Information Technology (ITSIM-08), August 2008, pp. 2798-2804.
[17] S. Marti, T.J. Giuli, K. Lai, and M. Baker. "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annual Int. Conf. on Mobile Computing and Networking (MobiCom'00), Boston, MA, August 2000, pp.255-265.
[18] S. Buchegger and J. Le Boudec, "Performance analysis of the CONFIDANT protocol: (Cooperation of nodes - fairness in dynamic adhoc networks)," in Proc. IEEE / ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc'02), Lausanne, Switzerland, June 2002, pp.226-336.
[19] P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security Conference (CMS'02), September 2002.
[20] S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Research Report cs.NI/0307012, Stanford University, 2003.
[21] Y. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," in Proc. ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03), October 2003, pp. 135-147.
[22] O. Kachirski and R. Guha, "Effective intrusion detection using multi-ple sensors in wireless ad hoc networks," in Proc. 36th Annual Hawaii Int. Conf. on System Sciences (HICSS'03), January 2003, p. 57.1.
[23] Y. Huang, W. Fan, W. Lee, and P. Yu, "Cross-feature analysis for detecting ad-hoc routing anomalies," in Proc. 23rd IEEE Int. Conf. on Distributed Computing Systems (ICDCS'03), May 2003, pp. 478-487.
[24] N. Nasser and Y. Chen, "Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc network," in Proc. IEEE Int. Conf. on Communication (ICC-07), June 2007, pp. 1154-1159.
[25] A. Hasswa, M. Zulker, and H. Hassanein, "Routeguard: an intrusion detection and response system for mobile ad hoc networks," Wireless and Mobile Computing, Networking and Communication, vol. 3, August 2005, P336-343.
[26] M. K. Rafsanjani, A. Movaghar, "Identifying monitoring nodes with selection of Authorized nodes in mobile ad hoc networks," World Applied Sciences Journal, vol. 4, no.3, pp. 444-449, 2008.
Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007