Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Co-operative IDS Architectures for MANETs - A Survey

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 61 - Number 1
Year of Publication: 2013
Authors:
Kapil Dhamecha
Rutvik Upadhyay
Bhushan Trivedi
10.5120/9896-4471

Kapil Dhamecha, Rutvik Upadhyay and Bhushan Trivedi. Article: Co-operative IDS Architectures for MANETs - A Survey. International Journal of Computer Applications 61(1):39-45, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Kapil Dhamecha and Rutvik Upadhyay and Bhushan Trivedi},
	title = {Article: Co-operative IDS Architectures for MANETs - A Survey},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {61},
	number = {1},
	pages = {39-45},
	month = {January},
	note = {Full text available}
}

Abstract

There are many IDSs (Intrusion Detection System) which are working on wired networks, but for MANETs we do not find any single application that can be applied directly. Different characteristics of MANET make the conventional IDSs ineffective and inefficient for the wireless environment. MANET is a combination of nodes with limited power, bandwidth and processing capability. In MANETs, an intrusion detection task performed by a single node reduces power level drastically in no time. Because of power constraints, we have to distribute the task among several nodes so that we can uphold the power level of legitimated nodes. In this paper we evaluate different performance parameters of distributed and cooperative IDSs and we also try to figure out which parameters are detracting, such as accuracy ratio, false positive and false negative detection ratio, node mobility, type of threat model and the complexity of the algorithm etc.

References

  • Albers P, Camp O, Percher J. , Jouga B, Me L, Puttini R. , 2002:Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches, Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), pp. 1–12
  • Bose S, Bharathimurugan S, Kannan A, February 2007, :Multilayer Integrated Anomaly Intrusion Detection System for Mobile Ad Hoc Networks, IEEE ICSCN 2007, MIT Campus, Anna University, Chennai, India, pp. 360-365.
  • Kachirski O, Guha R. K, 2003: Effective intrusion detection using multiple sensors in wireless ad hoc networks, Proceedings of HICS, 57
  • Kazienko P. , Dorosz P: Intrusion detection systems. Part I. Intrusion types and symptoms. Tasks and architecture of IDS. Translation from Polish , IT FAQ 12/2002, pp. 21-27
  • Komninos N, Douligeris C, January 2009 : LIDF: Layered intrusion detection framework for ad-hoc network, Elsevier Ad Hoc Networks, vol. 7, issue 1, pp. 171 – 182,
  • Razak S. A. , Furnell S. M. , Clarke N. L. , Brooke P. J. , September 2008: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks, Elsevier Ad Hoc Networks, vol. 6, issue 7, pp. 1151 – 1167.
  • Ramachandran C, Misra S, Obaidat M, October 2008: FORK: A novel two-pronged strategy for an agent based intrusion detection scheme in ad-hoc networks, Elsevier Computer Communications, vol. 31, issue 16, Performance Evaluation of Communication Networks (SPECTS 2007), pp. 3855-3869.
  • Sun B. , Wu K. , Pooch U. W , 2003: Routing anomaly detection in mobile ad hoc networks, IEEE International Conference on Computer Communications and Networks, (ICCCN'03), pp. 25-31.
  • Sun B, Wu K. , Xiao Y, Wang R, June 2007: Integration of mobility and intrusion detection for wireless ad hoc networks, Wiley International Journal of Communication Systems, vol. 20, issue 6, pp. 695 – 721.
  • Srinivasan T. , Seshadri J. , Sidharth Jonathan J. B. , Chandrasekhar A, august 2005 : A system for power aware intrusion detection in wireless ad-hoc networks, Proceedings of Third International Conference on Computer Networks and Mobile Computing, ICCNMC 2005, Springer Verlag, Berlin, Heidelberg, 2005, pp. 153–162. LNCS 3619, Zhangjiajie, China,
  • Srinivasan T, Vijaykumar V, Chandrasekar R, 2006 : An auction based task allocation scheme for power-aware intrusion detection in wireless ad-hoc networks, Proceedings of the Third International Conference on Wireless and Optical Networks, IEEE, Bangalore, India
  • Wang W. , H. Man, Y. Liu , April, 2009: A Framework for Intrusion Detection Systems by Social Network Analysis Methods in Ad Hoc Networks, Wiley Security and Communication Networks, vol. 2, issue 6, pp. 669 – 685.
  • Wireless Security Workshop, Sep2002 :WiSe'02 workshop on wireless security, Atlanta, pp. 11–20.
  • Yang, Meng X. , Lu S,2002: Self-organized network-layer security in mobile ad hoc networks", wise 02 proceeding of first acm workshop on wireless security, pages 11-20
  • Zhang Y, Lee W, Huang Y :A Intrusion detection techniques for mobile wireless networks, Wireless Network 9 (5) (2003) 545–556.
  • Zhang R. , 2004Using constructive induction to enhance the predictive accuracy of the c5 machine learning environment, Proceedings of IC-AI, pp. 1117–112.