skip to main content
10.1145/1163673.1163679acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Securing the AODV protocol using specification-based intrusion detection

Published:02 October 2006Publication History

ABSTRACT

This paper presents an implementation of an Intrusion Detection System (IDS) aiming to secure the AODV protocol designed for MANET. The IDS is designed as multiple static agents that run on a subset of the nodes in the network and executes a monitoring protocol that observes the process of route establishment. The monitoring protocol uses specification based intrusion detection to identify misuses to the routing messages. The IDS design is a correlation of previous work done in the field of MANET security. The IDS is implemented using ns-2 simulator and its ability to detect attacks was tested using previously devised attack scripts. Detailed specification for the runtime behavior of the AODV protocol was derived in the process of implementation

References

  1. Karchirski, O. and Guha, R., "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks", In Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) p.57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tseng, C., Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K., "A Specification-based Intrusion Detection System for AODV", Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 125--134. http://portal.acm.org/citation.cfm?id=986858.986876 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ning, P., Sun, K., "How to Misuse AODV: A case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols", In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pp. 60--67, West Point, June 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. Perkins, C. E., Royer, E. M., "Ad hoc On-Demand Distance Vector Routing", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90--100. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Securing the AODV protocol using specification-based intrusion detection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
          October 2006
          146 pages
          ISBN:1595934863
          DOI:10.1145/1163673

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 October 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate46of131submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader