CFP last date
20 May 2024
Reseach Article

A Comprehensive Survey on Secure Intrusion Detection Systems for MANETs

by Vishal U. Raut, M. S. Mahindrakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 21
Year of Publication: 2015
Authors: Vishal U. Raut, M. S. Mahindrakar
10.5120/21359-4365

Vishal U. Raut, M. S. Mahindrakar . A Comprehensive Survey on Secure Intrusion Detection Systems for MANETs. International Journal of Computer Applications. 119, 21 ( June 2015), 10-16. DOI=10.5120/21359-4365

@article{ 10.5120/21359-4365,
author = { Vishal U. Raut, M. S. Mahindrakar },
title = { A Comprehensive Survey on Secure Intrusion Detection Systems for MANETs },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 21 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number21/21359-4365/ },
doi = { 10.5120/21359-4365 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:04:38.987343+05:30
%A Vishal U. Raut
%A M. S. Mahindrakar
%T A Comprehensive Survey on Secure Intrusion Detection Systems for MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 21
%P 10-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, MANET become the foremost encouraging area for innovative work of the wireless communication system. It has inherited many vulnerabilities of wireless network because of open medium and self-organizing capability of nodes in MANETs. The intrusion detection system continuously observing for doubtful actions inside a system and then take proper action against them. There are many techniques for intrusion detection in wired system, however applying them directly into wireless environment is not possible. In this paper, we will see various well known intrusion detection system for MANETs with their problems and solutions. In this survey, latest intrusion recognition system specially designed for MANETs known as Enhanced Adaptive Acknowledgement system (EAACK) is discussed. This new scheme solves all the problems of existing intrusion detection systems such as detecting the malicious activities and the presence of false misbehaviour report.

References
  1. Djenouri, Djamel, L. Khelladi, and N. Badache, "A survey of security issues in mobile ad hoc networks," IEEE communications surveys 7, no. 4, 2005, pp. 2-28.
  2. T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," in Wireless/Mobile Security. New York: Springer Verlag, 2008.
  3. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, "An application-specific protocol architecture for wireless micro sensor networks," IEEE Transactions on Wireless Communications, 2002, pp. 660–670.
  4. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1983.
  5. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, "On intrusion detection and response for mobile ad hoc networks," in Proc. IEEE Int. Conf. Perform. , Comput. Communication, 2004, pp. 747–752.
  6. N. Nasser and Y. Chen, "Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network," in Proc. IEEE Int. Conf. Commun. , Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.
  7. A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37.
  8. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygi-annis, "Secure routing and intrusion detection in ad hoc networks," in Proc. 3rd Int. Conf. Pervasive Comput. Communication, 2005, pp. 191–199.
  9. Y. Zhang, W. Lee, and Y. Huang. (2003, Sep. ). Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5.
  10. Wu, Bing, Mihaela Cardei, Jie Wu, Jianmin Chen, and Mihaela Cardei. "A survey of attacks and countermeasures in mobile ad hoc networks. " In Wireless Network Security, pp. 103-135. Springer US, 2007.
  11. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  12. N. Kang, T. Sheltami, and E. Shakshuki, "Detecting misbehaving nodes in MANETs," in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.
  13. R. Rishi, P. Goyal1, V. Parmar. MANET: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
  14. Q. M Alriyami, E. Asimakopoulou and N. Bessis. A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks. IEEE International Conference on Intelligent Networking and Collaborative Systems, pp. 427-432. 2014.
  15. Johnson, D. , Y. Hu, and D. Maltz. "The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. " Vol. 260. RFC 4728, 2007.
  16. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. , Boston, MA, 2000, pp. 255-265.
  17. T. Sheltami, A. Mahmoud, E. Shakshuki, and A. Al-Roubaiey, "Video transmission enhancement in presence of misbehaving nodes in MANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009.
  18. M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM Workshop Wireless Secur. , 2002, pp. 1-10.
Index Terms

Computer Science
Information Sciences

Keywords

Active and passive attacks Dynamic source routing Intrusion detection systems Mobile ad hoc network Vulnerability Security.