CFP last date
22 April 2024
Reseach Article

Intrusion Detection Techniques in MANETs and WMNs

Published on March 2013 by Bishal Pradhan, Samarjeet Borah
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 2
March 2013
Authors: Bishal Pradhan, Samarjeet Borah

Bishal Pradhan, Samarjeet Borah . Intrusion Detection Techniques in MANETs and WMNs. International Conference on Computing, Communication and Sensor Network. CCSN2012, 2 (March 2013), 5-10.

author = { Bishal Pradhan, Samarjeet Borah },
title = { Intrusion Detection Techniques in MANETs and WMNs },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 2 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 5-10 },
numpages = 6,
url = { /specialissues/ccsn2012/number2/10852-1014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Bishal Pradhan
%A Samarjeet Borah
%T Intrusion Detection Techniques in MANETs and WMNs
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 2
%P 5-10
%D 2013
%I International Journal of Computer Applications

Intrusion Detection plays a very important role as it marks the first line of defence [14]. In multi-hop wireless network, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. So, the already existing intrusion detection technique in traditional networks doesn't serve the purpose. Hence, a specialized intrusion detection schemes must be designed for MANETs and WMNs, which not only identify and classifies every network activities and as either normal or abnormal, but also be able to detect the malicious among the abnormal activities. Various intrusion detection mechanisms has been proposed or adopted for the purpose. This paper surveys the IDS schemes proposed for or deployed in MANETs and WMNs.

  1. Satria Mandala, Md. Asri Ngadi, A. Hanan Abdullah, "A Survey on MANET Intrusion Detection", International Journal of Computer Science and Security, Volume (2): Issue (1).
  2. Oleg Kachirski, Ratan Guha, "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks", Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) IEEE, 2006.
  3. R. Nakkeeran, T. Aruldoss Albert and R. Ezumalai, "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks", IACSIT International Journal of Engineering and Technology Vol. 2, No. 1, February, 2010.
  4. Ed' Wilson Tavares Ferreira, Ruy de Oliveira, Gilberto Arantes Carrijo, Bharat Bhargava, "Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach", 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009.
  5. P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security Conference (CMS'02), September 2002.
  6. S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad hoc networks," Research Report cs. NI/0307012, Stanford University, 2003.
  7. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi, "Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes", World Academy of Science, Engineering and Technology, 44, 2008.
  8. Shafiullah Khan, Kok-Keong Loo, Zia Ud Din, "Framework for Intrusion Detection in IEEE 802. 11 Wireless Mesh Networks", The International Arab Journal of Information Technology, Vol. 7, October 2010.
  9. Zonghua Zhang, Farid Na¨?t-Abdesselam, Pin-Han Ho, Xiaodong Lin, "RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks", WCNC 2008 proceedings, 2008
  10. Xia Wang, Johnny S. Wong, Fred Stanley and Samik Basu, "Cross-layer Based Anomaly Detection in Wireless Mesh Networks", Ninth Annual International Symposium on Applications and the Internet, 2009.
  11. Xuemei You, "Research on the Intrusion Detection System in Wireless Mesh Networks", Second International Conference on Computer Modeling and Simulation, 2010
  12. P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges", computers & security 28 (2009) Elsevier, October 2008, Pp18–28
  13. Yatao Yang, Ping Zeng, Xinghua Yang, Yina Huang, "Efficient Intrusion Detection System Model in Wireless Mesh Network", Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
  14. Chen M. , Kuo S. , Li P. , andZhu M. , "Intrusion Detection in Wireless Mesh Network". CRC Press, 2007.
  15. H. Yang, et al. , "Security in mobile ad hoc networks: challenges and solutions", IEEE Wireless Communications, vol. 11, Feb. 2004.
Index Terms

Computer Science
Information Sciences


Intrusion Intrusion Detection Intrusion Detection System (ids) Mobile Ad-hoc Network (manet) Wireless Mesh Network (wmn) Anomaly Misuse Response