Skip to main content

A Survey on Intrusion Detection in Mobile Ad Hoc Networks

  • Chapter
Wireless Network Security

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless networks are not well suited for MANETs. In this paper, we classify the architectures for intrusion detection systems (IDS) that have been introduced for MANETs. Current IDS ’s corresponding to those architectures are also reviewed and compared. We then provide some directions for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.

    Google Scholar 

  2. A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wireless Ad Hoc Networks,” IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48–60, February 2004.

    Article  Google Scholar 

  3. P. Albers, O. Camp, J. Percher, B. Jouga, L. Mé, and R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1–12, April 2002.

    Google Scholar 

  4. O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’ 03), p. 57.1, January 2003.

    Google Scholar 

  5. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom’ OO), pp. 255–265, August 2000.

    Google Scholar 

  6. S. Buchegger and J. Le Boudée, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes — Fairness In Dynamic Ad-hoc NeTworks),” Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’ 02), pp. 226–336, June 2002.

    Google Scholar 

  7. P. Michiardi and R. Molva, “Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks,” Communication and Multimedia Security Conference (CMS’ 02), September 2002.

    Google Scholar 

  8. D. B. Johnson, and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft),” Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.

    Google Scholar 

  9. P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad-hoc Networks,” Proceedings of 2003 Symposium on Applications and the Internet Workshop, pp. 368–373, January 2003.

    Google Scholar 

  10. M. G. Zapata, “Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing,” ACM Mobile Computing and Communication Review (MC2R), Vol. 6, No. 3, pp. 106–107, July 2002.

    Article  Google Scholar 

  11. Y. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’ 02), pp. 3–13, June 2002.

    Google Scholar 

  12. Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks,” Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom’ 02), pp. 12–23, September 2002.

    Google Scholar 

  13. A. Perrig, R. Canetti, D. Tygar and D. Song, “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, 5(Summer), 2002.

    Google Scholar 

  14. Y Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN’ 03), pp. 135–147, October 2003.

    Google Scholar 

  15. Y Huang, W. Fan, W Lee, and P. Yu, “Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies,” Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS’ 03), May 2003.

    Google Scholar 

  16. D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y Tseng, T. Bowen, K. Levitt, and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs,” Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA’ 05), pp. 57–70, March 2005.

    Google Scholar 

  17. Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 2, pp. 69–83, January 2000.

    Google Scholar 

  18. E. Y. K. Chan et al., “IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks,” Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN’ 04), pp. 581–586, May 2004.

    Google Scholar 

  19. S. Bansal and M. Baker, “Observation-Based Cooperation Enforcement in Ad hoc Networks,” Research Report cs.NI/0307012, Stanford University, 2003.

    Google Scholar 

  20. P. Michiardi and R. Molva, “A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad Hoc Networks,” Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’ 03), March 2003.

    Google Scholar 

  21. A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach,” Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA’ 04), pp. 343–346, 2004.

    Google Scholar 

  22. R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, “Experiences Applying Game Theory to System Design,” Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PIN’ 04), pp. 183–190, September 2004.

    Google Scholar 

  23. S. Zhong, L. Li, Y. G. Liu and Y. Yang, “On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-hoc Networks: An Integrated Approach Using Game Theoretical and Cryptographic Techniques,” Proceedings of the 1 lth Annual International Conference on Mobile Computing and Networking (MobiCom’ 05), pp. 117–131, 2005.

    Google Scholar 

  24. B. Sun, K. Wu, and U. W. Pooch, “Alert Aggregation in Mobile Ad Hoc Networks,” Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe’ 03) in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom’ 03), pp. 69–78, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Anantvalee, T., Wu, J. (2007). A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-33112-6_7

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-28040-0

  • Online ISBN: 978-0-387-33112-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics