Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 18
Year of Publication: 2013
Authors:
Rajeshkumar. G
K. R. Valluvan
10.5120/11492-7199

Rajeshkumar. G and K R Valluvan. Article: A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs. International Journal of Computer Applications 67(18):1-5, April 2013. Full text available. BibTeX

@article{key:article,
	author = {Rajeshkumar. G and K. R. Valluvan},
	title = {Article: A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {18},
	pages = {1-5},
	month = {April},
	note = {Full text available}
}

Abstract

In recent years, security has become a most important service in Mobile Adhoc Network. Compared to other networks, MANETs are more vulnerable to various types of attacks. In this paper, a comparative study of Secure Intrusion-Detection Systems for discovering malicious nodes and attacks on MANETs are presented. Due to some special characteristics of MANETs, prevention mechanisms alone are not adequate to manage the secure networks. In this case detection should be focused as another part before an attacker can damage the structure of the system. First this paper gives an overview of IDS architecture for enhancing security level of MANETs based on security attributes and various algorithms, namely RSA and DSA. Then a hybrid cryptography IDS to further reduce the network overhead caused by digital signature is indicated.

References

  • EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE
  • Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes Marjan Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and Technology 44 2008.
  • L. Zhou, Z. J. Haas, Cornell Univ. , "Securing ad hoc networks," IEEE Network, Nov/Dec 1999,
  • Mishra Amitabh, Nadkarni Ketan M. , and Ilyas Mohammad,2003. "Chapter 30:Security in wireless ad-hoc networks, the handbook of Ad hoc wireless network". CRC PRESS Publisher
  • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehaviour in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. , Boston, MA, 2000, pp. 255–265.
  • "A study of different types of attacks on multicast in mobile ad hoc networks" Hoang Lan Nguyen, Uyen Trang Nguyen, Elsevier AdHoc Networks(2008) 32-46.
  • D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks," in Mobile computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
  • T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes inMANETs," Int. J. Multimedia Syst. , vol. 15, no. 5, pp. 273–282, Oct. 2009.
  • K. Stanoevska-Slabeva and M. Heitmann, "Impact of mobile ad-hoc networks on the mobile value system," in Proc. 2nd Conf. m-Bus. , Vienna, Austria, Jun. 2003.
  • A. Tabesh and L. G. Frechette, "A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator," IEEE Trans. Ind. Electron. , vol. 57, no. 3, pp. 840–849, Mar. 2010.
  • "Misbehavior Nodes Detection and Isolation for MANETs OLSR Protocol"Ahmed M. Abdallaa, Imane A. Saroitb, Amira Kotbb, Ali H. Afsaric a* 2010 Published by Elsevier Ltd.
  • http://www. scribd. com/doc/55488795/48/MANET-Security-Services#outer_page_29
  • H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, "Security in mobile ad hoc networks:Challenges and solutions" (2004). IEEE Wireless Communications. 11 (1), pp. 38-47.
  • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE Trans. Mobile Comput. , vol. 6, no. 5, pp. 536–550, May 2007.
  • " Security Issues in Mobile Adhoc Networks-A Survey" Wenjia Li and Anupam Joshi University of Maryland, Baltimore Country.
  • M. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM Workshop Wireless Secur. , 2002, pp. 1–10.
  • R. Akbani, T. Korkmaz, and G. V. S. Raju, "Mobile Ad hoc Network Security," in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
  • R. H. Akbani, S. Patel, and D. C. Jinwala, "DoS attacks in mobile ad hoc networks: A survey," in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
  • Karan Singh, R. S. Yadav, Ranvijay, "A REVIEW PAPER ON AD HOC NETWORK SECURITY",International Journal of Computer Science and Security, Volume (1): Issue (1)