Abstract
In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless networks are not well suited for MANETs. In this paper, we classify the architectures for intrusion detection systems (IDS) that have been introduced for MANETs. Current IDS ’s corresponding to those architectures are also reviewed and compared. We then provide some directions for future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wireless Ad Hoc Networks,” IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48–60, February 2004.
P. Albers, O. Camp, J. Percher, B. Jouga, L. Mé, and R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1–12, April 2002.
O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’ 03), p. 57.1, January 2003.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom’ OO), pp. 255–265, August 2000.
S. Buchegger and J. Le Boudée, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes — Fairness In Dynamic Ad-hoc NeTworks),” Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’ 02), pp. 226–336, June 2002.
P. Michiardi and R. Molva, “Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks,” Communication and Multimedia Security Conference (CMS’ 02), September 2002.
D. B. Johnson, and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (Internet-Draft),” Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.
P. Brutch and C. Ko, “Challenges in Intrusion Detection for Wireless Ad-hoc Networks,” Proceedings of 2003 Symposium on Applications and the Internet Workshop, pp. 368–373, January 2003.
M. G. Zapata, “Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing,” ACM Mobile Computing and Communication Review (MC2R), Vol. 6, No. 3, pp. 106–107, July 2002.
Y. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’ 02), pp. 3–13, June 2002.
Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks,” Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom’ 02), pp. 12–23, September 2002.
A. Perrig, R. Canetti, D. Tygar and D. Song, “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, 5(Summer), 2002.
Y Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN’ 03), pp. 135–147, October 2003.
Y Huang, W. Fan, W Lee, and P. Yu, “Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies,” Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS’ 03), May 2003.
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y Tseng, T. Bowen, K. Levitt, and J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs,” Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA’ 05), pp. 57–70, March 2005.
Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang, “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Networks Infrastructure,” Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 2, pp. 69–83, January 2000.
E. Y. K. Chan et al., “IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks,” Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN’ 04), pp. 581–586, May 2004.
S. Bansal and M. Baker, “Observation-Based Cooperation Enforcement in Ad hoc Networks,” Research Report cs.NI/0307012, Stanford University, 2003.
P. Michiardi and R. Molva, “A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad Hoc Networks,” Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’ 03), March 2003.
A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach,” Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA’ 04), pp. 343–346, 2004.
R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, “Experiences Applying Game Theory to System Design,” Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PIN’ 04), pp. 183–190, September 2004.
S. Zhong, L. Li, Y. G. Liu and Y. Yang, “On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-hoc Networks: An Integrated Approach Using Game Theoretical and Cryptographic Techniques,” Proceedings of the 1 lth Annual International Conference on Mobile Computing and Networking (MobiCom’ 05), pp. 117–131, 2005.
B. Sun, K. Wu, and U. W. Pooch, “Alert Aggregation in Mobile Ad Hoc Networks,” Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe’ 03) in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom’ 03), pp. 69–78, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Anantvalee, T., Wu, J. (2007). A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-33112-6_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-28040-0
Online ISBN: 978-0-387-33112-6
eBook Packages: EngineeringEngineering (R0)