Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Intrusion Detection Techniques in MANETs and WMNs

IJCA Special Issue on International Conference on Computing, Communication and Sensor Network
© 2013 by IJCA Journal
CCSN2012 - Number 2
Year of Publication: 2013
Bishal Pradhan
Samarjeet Borah

Bishal Pradhan and Samarjeet Borah. Article: Intrusion Detection Techniques in MANETs and WMNs. IJCA Special Issue on International Conference on Computing, Communication and Sensor Network CCSN2012(2):5-10, March 2013. Full text available. BibTeX

	author = {Bishal Pradhan and Samarjeet Borah},
	title = {Article: Intrusion Detection Techniques in MANETs and WMNs},
	journal = {IJCA Special Issue on International Conference on Computing, Communication and Sensor Network},
	year = {2013},
	volume = {CCSN2012},
	number = {2},
	pages = {5-10},
	month = {March},
	note = {Full text available}


Intrusion Detection plays a very important role as it marks the first line of defence [14]. In multi-hop wireless network, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. So, the already existing intrusion detection technique in traditional networks doesn't serve the purpose. Hence, a specialized intrusion detection schemes must be designed for MANETs and WMNs, which not only identify and classifies every network activities and as either normal or abnormal, but also be able to detect the malicious among the abnormal activities. Various intrusion detection mechanisms has been proposed or adopted for the purpose. This paper surveys the IDS schemes proposed for or deployed in MANETs and WMNs.


  • Satria Mandala, Md. Asri Ngadi, A. Hanan Abdullah, "A Survey on MANET Intrusion Detection", International Journal of Computer Science and Security, Volume (2): Issue (1).
  • Oleg Kachirski, Ratan Guha, "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks", Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) IEEE, 2006.
  • R. Nakkeeran, T. Aruldoss Albert and R. Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks", IACSIT International Journal of Engineering and Technology Vol. 2, No. 1, February, 2010.
  • Ed' Wilson Tavares Ferreira, Ruy de Oliveira, Gilberto Arantes Carrijo, Bharat Bhargava, "Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach", 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009.
  • P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security Conference (CMS'02), September 2002.
  • S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Research Report cs. NI/0307012, Stanford University, 2003.
  • Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi, "Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes", World Academy of Science, Engineering and Technology, 44, 2008.
  • Shafiullah Khan, Kok-Keong Loo, Zia Ud Din, "Framework for Intrusion Detection in IEEE 802. 11 Wireless Mesh Networks", The International Arab Journal of Information Technology, Vol. 7, October 2010.
  • Zonghua Zhang, Farid Na¨?t-Abdesselam, Pin-Han Ho, Xiaodong Lin, "RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks", WCNC 2008 proceedings, 2008
  • Xia Wang, Johnny S. Wong, Fred Stanley and Samik Basu, "Cross-layer Based Anomaly Detection in Wireless Mesh Networks", Ninth Annual International Symposium on Applications and the Internet, 2009.
  • Xuemei You, "Research on the Intrusion Detection System in Wireless Mesh Networks", Second International Conference on Computer Modeling and Simulation, 2010
  • P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges", computers & security 28 (2009) Elsevier, October 2008, Pp18–28
  • Yatao Yang, Ping Zeng, Xinghua Yang, Yina Huang, "Efficient Intrusion Detection System Model in Wireless Mesh Network", Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
  • Chen M. , Kuo S. , Li P. , andZhu M. , "Intrusion Detection in Wireless Mesh Network". CRC Press, 2007.
  • H. Yang, et al. , "Security in mobile ad hoc networks: challenges and solutions", IEEE Wireless Communications, vol. 11, Feb. 2004.