Book Details

Intrusion Detection Systems in Mobile Ad Hoc Networks: A Review

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Mobile ad hoc networks (MANETs) consist of mobile nodes arranged in a manner to collect information about surrounding environment. Their distributed nature, multi-hop data forwarding, and open wireless medium are the factors that make MANETs highly exposed to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. This paper presents current Intrusion Detection Systems and some open research problems related to MANET security.

References

[1] Y. Zhang, W. Lee, and Y. Huang, Intrusion Detection Techniques for Mobile Wireless Networks," ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.

[2] M. G. Zapata, \Secure Ad Hoc On-Demand Distance Vector (SAODV)Routing," ACM Mobile Computing and Communication Review(MC2R), Vol. 6, No. 3, pp. 106-107, July 2002.

[3] Y. Hu, D. B. Johnson, and A. Perrig, \SEAD: Secure E±cient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02), pp. 3-13, June 2002.

[4] Y. Hu, A. Perrig, and D. B. Johnson, \Ariadne: A secure On Demand Routing Protocol for Ad hoc Networks," Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom'02), pp. 12-23, September 2002.

[5] A. Perrig, R. Canetti, D. Tygar and D. Song, \The TESLA Broadcast Authentication Protocol, "RSA CryptoBytes, 5 (summer), 2002.

[6]S. Khan, K. K. Loo, and Z. U. Din, “Framework for intrusion detection in IEEE 802.11 wireless mesh networks,” International Arab Journal of Information Technology, vol. 7, no. 4, pp. 435–440, 2010. View at Google Scholar · View at Scopus

[7] R.Sheikh, M. S. Chande, and D. K. Mishra, "Security issues in MANET:A review," presented at the Seventh International Conference On Wireless And Optical Communications Networks (WOCN), 2010.

[8] H.Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks,” Communications Magazine, IEEE, 2002.

[9] H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012.

[10] Y.Z.a and W. Lee, "Intrusion Detection in Wireless Ad Hoc networks," presented at the 6th Int’l. Conf. Mobile Comp. Net., MobiCom, 2000.

[11] F.S.a and R. Anderson, "The Resurrecting Ducking: Security Issues for Ad-Hoc Wireless Networks," 7th Int’l. Wksp on Security Protocols. Proc., LNC, 1999.

[12] X.Zhao, Z. You, Z. Zhao, D. Chen, and F. Peng, "Availability Based Trust Model of Clusters for MANET," presented at the 7th International Conference on Service Systems and Service Management (ICSSSM), 2011.

[13] E.C.H.Ngai and L. M. R, "Trust and clustering-based Authentication Services in Mobile ad hoc networks," presented at the proceeding of the 24th international conference on Distributed Computing systems Workshops 2004.

[14] W.Lou, W. Liu, and Y. Fang, "SPREAD: enhancing data confidentiality in mobile ad hoc networks," presented at the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004.

[15] S.Rana and A. Kapil, "Security-Aware Efficient Route Discovery for DSR in MANET," Information and Communication Technologies, Communications in Computer and Information Science, vol. 101, pp. 186-194, 2010.

[16] X.Lv and H. Li, "Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks," Information Security, IET, vol. 7, 2013.

[17] S.a.A.k.G, H.o.d.R.m, and S. Sharma, "A Comprehensive Review of Security Issues in Manets," International Journal of Computer Applications vol. 69 2013.

[18] V.P and R.P.Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application,” IJCEM International journal of Computational Engineering & management, vol. 11, 2011.

[18] [19] A.MISHRA, R. Jaiswal, and S. Sharma, “A novel

[19] approach for detecting and eliminating cooperative

[20] black hole attack using advanced DRI table in Ad hoc

[21] Network," presented at the 3rd International Conference

[22] on Advance Computing Conference (IACC), 2013

[20] A.dorri and T. m. k. zade, " ? ? ?? ? ? ? ????? ? ? ? ?

? ? ," presented at the first regional computing in electronics and engineering, 2014.

[21] N.-W. Lo and F.-L. Liu, "A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET," in Intelligent Technologies and Engineering Systems. vol. 234, J. Juang and Y.-C. Huang, Eds., ed: Springer New York, 2013, pp. 59-65.

[22] M.A. Gorlatova, P. C. Mason, M. Wang, and L. Lamont, “Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military Communications Conference, IEEE, MILCOM, 2006.

[23] S.Keer and A. Suryavanshi, "To prevent wormhole attacks using wireless protocol in MANET," presented at the International Conference on Computer and Communication Technology (ICCCT), 2010.

[24] Z.A.Khan and M. H. Islam, "Wormhole attack: A new detection technique," presented at the international conference on Emerging Technologies (ICET), 2012.

[25] M.Yu, M. C. Zhou, and W. Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments," IEEE Transactions on Vehicular Technology, vol. 58 [26] G.Singla, M. S. Sathisha, A. Ranjan, S. D., and

P. Kumara, "Implementation of protected routing to defend byzantine attacks for MANET’s," International Journal of Advanced Research in Computer Science, vol. 3, p. 109, 2012.

[27] G.Singla and P. Kaliyar, "A Secure Routing Protocol for MANETs Against Byzantine Attacks," Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering, vol. 131, pp. 571-578, 2013.

[28] S.Shaw, K. Orea, P. Venkateswaran, and R. Nandi, " Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks," Computer Networks and Information Technologies Communications in Computer and Information Science, vol. 142, pp. 308-310, 2011.

[29] B.Kannhavong, H. Nakayama, Y. Nemoto, and N. Kato, "A survey of routing attacks in mobile ad hoc networks," Wireless Communications, IEEE Transactions, vol. 14 [30]M.Abdelhaq, R. Hassan, and R. Alsaqour, "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET," Software Engineering and Computer Systems Communications in Computer and Information Science vol. 181, pp. 429-442, 2011.

[31] L.Rajeswari, A. Prema, R. A. Xavier, and A. Kannan, "Enhanced intrusion detection techniques for mobile ad hoc networks," presented at the International Conference on Information and Communication Technology in Electrical Sciences (ICTES), 2007.

[32] A.K.Rai, R. R. Tewari, and S. K. Upadhyay,"different type of attacks on integrated MANET- internet comunication," international journal of computer science and security (IJCSS), vol. 4.

[33] J.Y.Kim, H. K. Choi, and S. Song, "A secure and lightweight approach for routing optimization in mobile IPv6," EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security, vol. 7, 2009.

[34] Supriya and M. Khari, "Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey," Advances in Computer Science and Information Technology. Networks and Communications Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 84, pp. 119-124, 2012.

[35] J.Soryal and T. Saadawi, "IEEE 802.11 Denialof Service attack detection in MANET," Wireless Telecommunications Symposium (WTS), 2012.

[36] R.H.Jhaveri, S. J. Patel, and D. C. Jinwala, "DoS Attacks in Mobile Ad Hoc Networks: A Survey," presented at the Second International Conference on Advanced Computing & Communication Technologies (ACCT), 2012

[37] A.Michael and Nadeem, "Adaptive intrusion detection & prevention of denial of service attacks in MANETs," presented at the IWCMC '09 Proceedings of the International Conference on Wireless Communications and Mobile Computing, Connecting the World Wirelessly, 2009.

[38] J.Su and H. Liu, "Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network," Applied Informatics and Communication Communications in Computer and Information Science, vol. 224, pp. 233-240, 2011.

[39] A.Hamieh and J. Ben-othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution," presented at the International Conference on Communications, ICC '09. IEEE, 2009.

[40] J.Ben-othman and A. Hamieh, "Defending method against jamming attack in wireless ad hoc networks," presented at the 34th Conference on Local Computer Networks, LCN, IEEE, 2009.

[41] D.Glynos, P. Kotzanikolaou, and C.Douligeris, "Preventing impersonation attacks in MANET with multi-factor authentication," hird International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WIOPT, 2005.

[42] C.Douligeris, P. Kotzanikolaou, and D. Glynos, "Preventing Impersonation Attacks in MANET with Multi-Factor Authentication," WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005.

[43] M.Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks," Secure Mobile Ad-hoc Networks and Sensors Lecture Notes in Computer Science, vol. 4074, pp. 80-95, 2006.

[44] N.Dixit, S. Agrawal, and V. K. Singh, "A Proposed Solution for security Issues In MANETs," International Journal of Engineering Research & Technology (IJERT), vol. 2, 2013.

[45] Vaithiyanathan, S. R. Gracelin, E. N. Edna, and S. Radha, "A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm," presented at the International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), 2010

[46] P.Yi, X. Jiang, and Y. Wu, "Distributed intrusion detection for mobile ad hoc networks," Journal on Systems Engineering and Electronics, IEEE, vol. 19, 2008.

[47] S.R. Afzal, S. Biswas, J. B. Koh, T. Raza, and m. authors, "RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks," presented at the Wireless Communications and Networking Conference, WCNC, IEEE, 2008.

[48] P.T. Tharani, K. Muthupriya, and C. Timotta, "Secured consistent network for coping up with gabrication attack in MANET," international journal of Emerging Technology and Advanced Engeineering, vol. 3, 2013.

[49] D.Sharma, P. G. Shah, and X. Huang,"Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange," presented at the NSS '10 Proceedings of the Fourth International Conference on Network and System Security, 2010.

[50] K.Vishnu, "A new kind of transport layer attack in wireless Ad Hoc Networks," presented at the International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010

[51] X.Zou, A. Thukral, and B. Ramamurthy, "An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks," Mobile Ad-hoc and Sensor Networks Lecture Notes in Computer Science, vol. 4325, pp. 509-520, 2006.

[52] J.Liu, F. Fu, J. Xiao, and Y. Lu, "Secure Routing for Mobile Ad Hoc Networks," presented at the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD, 2007.

[53] J.Sen, B. Tata, M. Chandra, S. Harihara, and H. Reddy, "A mechanism for detection of gray hole attack in mobile Ad Hoc networks," presented at the 6th International Conference on Information, Communications & Signal Processing, 2007.

[54] G.Usha and S. Bose, "Impact of Gray hole attack on adhoc networks," presented at the International Conference on Information Communication and Embedded Systems (ICICES), 2013

[55] G.Xiaopeng and C. Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks," presented at the IFIP International Conference on Network and Parallel Computing Workshops, NPC Workshops, 2007.

[56]. S. Khan, N. A. Alrajeh, and K.-K. Loo, “Secure route selection in wireless mesh networks,” Journal of Computer Networks, vol. 56, no. 2, pp. 491–503, 2012. View at Publisher · View at Google Scholar

[57].D. Djenouri, L. Khelladi, and N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications Surveys & Tutorials, vol. 7, no. 4, 2005. View at Google Scholar

[58].M. S. Siddiqui and S. H. Choong, “Security issues in wireless mesh networks,” in Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE '07), pp. 717–722, April 2007. View at Publisher · View at Google Scholar · View at Scopus

 [59]. S. Khan and K.-K. Loo, “Real-time cross-layer design for a large-scale ood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks,” Network Security, vol. 2009, no. 5, pp. 9–16, 2009. View at Publisher · View at Google Scholar · View at Scopus

[60].I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proceedings of the 13th European Wireless Conference, Paris, France, April 2007.

 [61].I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, “Intrusion detection of Sinkhole attacks in wireless sensor networks,” in Algorithmic Aspects of Wireless Sensor Networks ALGOSENSORS, vol. 4837 of Lecture Notes in Computer Science, pp. 150–161, Springer, 2008. View at Publisher · View at Google Scholar · View at Scopus

[62].H.Jadidoleslamy, “A hierarchical intrusion detection architecture for wireless sensor networks,”International Journal of Network Security & Its Applications, vol. 3, no. 5, 2011. View at Google Scholar

[63].A. Abraham, C. Grosan, and C. Martin-Vide, “Evolutionary design of intrusion detection programs,” International Journal of Network Security, vol. 4, no. 3, pp. 328–339, 2007. View at Google Scholar

[65].A. Abraham, R. Jain, J. omas, and S. Y. Han, “D-SCIDS: distributed so computing intrusion detection system,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 81–98, 2007. View at Publisher · View at Google Scholar · View at Scopus

[66].A. P. R. Da Silva, A. A. F. Loureiro, M. H. T. Martins, L. B. Ruiz, B. P. S. Rocha, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet '05), pp. 16–23, Montreal, Canada, October 2005. View at Publisher · View at Google Scholar · View at Scopus

[67]S. Banerjee, C. Grosan, and A. Abraham, “IDEAS: Intrusion detection based on emotional ants for sensors,” in Proceedings of the 5th International Conference on Intelligent Systems Design and Applications (ISDA '05), pp. 344–349, September 2005. View at Publisher · View at Google Scholar · View at Scopus

[68]M. S. Islam and S. A. Rahman, “Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches,” International Journal of Advanced Sciences and Technology, vol. 36, pp. 1–8, 2011. View at Google Scholar

[69]Y. Y. Li and L. E. Parker, “Intruder detection using a wireless sensor network with an intelligent mobile robot response,” in IEEE Conference Southeastcon, pp. 37–42, April 2008. View at Publisher · View at Google Scholar · View at Scopus

[70]V. Bhuse and A. Gupta, “Anomaly intrusion detection in wireless sensor networks,” Journal of High Speed Networks, vol. 15, no. 1, pp. 33–51, 2006. View at Google Scholar View at Scopus 35.

 [71]C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami, “Intrusion detection for routing attacks in sensor networks,” International Journal of Distributed Sensor Networks, vol. 2, no. 4, pp. 313–332, 2006. View at Publisher · View at Google Scholar · View at Scopus

 [72]H. Deng, Q. A. Zeng, and D. P. Agrawal, “SVM-based intrusion detection system for wireless ad hoc networks,” in Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03), pp. 2147–2151, October 2003. View at Scopus

[73]Y. A. Huang, W. Fan, W. Lee, and P. S. Yu, “Cross-feature analysis for detecting ad-hoc routing anomalies,” in Proceedings of the 23th IEEE International Conference on Distributed Computing Systems, pp. 478–487, May 2003. View at Scopus

 [74]I. Onat and A. Miri, “An intrusion detection system for wireless sensor networks,” in Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '2005), pp. 253–259, August 2005. View at Publisher · View at Google Scholar · View at Scopus

 [75]M. S. I. Mamun and A. F. M. Sultanul Kabir, “Hierarchical design based intrusion detection system for wireless ad hoc sensor network,” International Journal of Network Security & Its Applications, vol. 2, no. 3, 2010. View at Google Scholar

[76]H. Sedjelmaci and M. Feham, “Novel hybrid intrusion detection system for clustered wireless sensor network,” International Journal of Network Security & Its Applications, vol. 3, no. 4, 2011. View at Google Scholar

[77]R. Bhatnagar and U. Shankar, “ e proposal of hybrid intrusion detection for defence of sync ood attack in wireless sensor network,” International Journal of Computer Science & Engineering Survey, vol. 3, no. 2, pp. 31–38, 2012. View at Publisher · View at Google Scholar

 [78]K. Q. Yan, S. C. Wang, and C. W. Liu, “A hybrid intrusion detection system of cluster-based wireless sensor networks,” in Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS '09), Hong Kong, 2009.

[79] K. Q. Yan, S. C. Wang, S. S. Wang, and C. W. Liu, “Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network,” in Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT '10), pp. 114–118, Chengdu, China, July 2010. View at Publisher · View at Google Scholar · View at Scopus

[80]T. H. Hai, F. Khan, and E. N. Huh, “Hybrid intrusion detection system for wireless sensor networks,” in Computational Science and Its ApplicationsICCSA 2007, vol. 4706 of Lecture Notes in Computer Science, pp. 383–396, Springer, Berlin, Germany, 2007. View at Google Scholar · View at Scopus

 [81]S. Khan, K.-K. Loo, and Z. U. Din, “Cross layer design for routing and security in multi-hop wireless networks,” International Journal of Information Assurance and Security, vol. 4, no. 2, pp. 170–173, 2009. View at Google Scholar

[82]D. E. Boubiche and A. Bilami, “Cross layer intrusion detection system for wireless sensor network,” International Journal of Network Security & Its Applications, vol. 4, no. 2, 2012. View at Google Scholar

[83]M. Xiao, X. Wang, and G. Yang, “Cross-layer design for the security of wireless sensor networks,” in Proceedings of the 6th World Congress on Intelligent Control and Automation (WCICA '06), pp. 104–108, Dalian, China, June 2006. View at Publisher · View at Google Scholar .View at Scopus

Keywords

Mobile Ad Hoc Network (MANET), Security, Attacks on MANET.

Image
  • Format Volume 4, Issue 2, No 1, 2016
  • Copyright All Rights Reserved ©2016
  • Year of Publication 2016
  • Author B.Venkatesh, V.Suresh, A.Anjaneyulu
  • Reference IJCS-117
  • Page No 679-693

Copyright 2024 SK Research Group of Companies. All Rights Reserved.