CFP last date
20 May 2024
Reseach Article

Exploring Intrusion Detection Schemes and their Comparison in MANETs

by Ankita Chaturvedi, Sanjiv Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 10
Year of Publication: 2013
Authors: Ankita Chaturvedi, Sanjiv Sharma
10.5120/12398-8780

Ankita Chaturvedi, Sanjiv Sharma . Exploring Intrusion Detection Schemes and their Comparison in MANETs. International Journal of Computer Applications. 71, 10 ( June 2013), 55-59. DOI=10.5120/12398-8780

@article{ 10.5120/12398-8780,
author = { Ankita Chaturvedi, Sanjiv Sharma },
title = { Exploring Intrusion Detection Schemes and their Comparison in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 10 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 55-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number10/12398-8780/ },
doi = { 10.5120/12398-8780 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:13.957448+05:30
%A Ankita Chaturvedi
%A Sanjiv Sharma
%T Exploring Intrusion Detection Schemes and their Comparison in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 10
%P 55-59
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The feasibility of mobile ad hoc networks (MANETs) is gaining popularity widely. Due to its fundamental characteristics like dynamic topology, open medium, absence of infrastructure, limited power and limited bandwidth, these networks are more prone to malicious attacks. The prevention methods like encryption and cryptography are not sufficient to make them secure. The reason behind this is that these techniques focus on how to protect the data but do not take any action against the intruder. Therefore some detection mechanism must be deployed to facilitate the identification and isolation of attacks before an attacker breaches the system. This paper presents the existing architectures for intrusion detection systems (IDS) along with intrusion detection techniques in MANETs and their comparison.

References
  1. A. Mishra and K. M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book "The Handbook of Ad Hoc Wireless Networks (Chapter 30)", CRC Press LLC, 2003.
  2. Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, 2003.
  3. M. G. Zapata, "Secure Ad Hoc On-demand Distance Vector (SAODV) Routing", ACM Mobile Computing and Communication Review (MC2R), Vol. 6, No. 3, pp. 106-107, 2002.
  4. Y. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", Proceedings of the 4th IEEE Workshop On Mobile Computing Systems And Applications (WMCSA'02), pp. 3-13, 2002.
  5. Y. Hu, A. Perrig and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol For Ad Hoc Networks, "Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (Mobicom'02), pp. 12-23, 2002.
  6. A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA CryptoBytes, 5 (summer), 2002.
  7. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks" IEEE Wireless Communication, Vol. 11, Issue 1, pp. 48-60, 2004.
  8. T. Anantvalee and J. Wu, " A survey on Intrusion Detection in Mobile ad Hoc Networks", Book Series Wireless Network Security, Springer, pp. 170-196, ISBN: 978-0-387-28040-0, 2006.
  9. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", Proceedings of the 6th Annual International Conference on Mobile Computing And Networking (Mobicom'00), pp. 255-265, 2000.
  10. S. Buchegger and J. Le Boudec, "Performance Analysis of the CONFIDANT protocol (Cooperation of Nodes- Fairness In Dynamic Ad Hoc networks)", Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), pp. 226-336, 2002.
  11. P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc networks", Communication and Multimedia Security Conference (CMS'02), 2002.
  12. S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks", Research Report cs. NI/0307012, Stanford University, 2003.
  13. Y. Huang and W. Lee, "A Cooperative Intrusion Detection System for Ad Hoc Networks", Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03), pp. 135-147, 2003.
  14. Y. Huang, W. Fan, W. Lee, and P. Yu, "Cross-Feature Analysis for Detecting Ad Hoc routing Anomalies", Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS'03), 2003.
  15. N. Nasser and Y. Chen, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks", Proceedings of the ICC, 2007.
  16. S. Sahu and S. K. Shandilya, "A Comprehensive Survey on Intrusion Detection in MANET", International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, pp. 305-310, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network intrusion detection system malicious attack encryption cryptography