Abstract

A Mobile Ad hoc Network (MANET) consists of a group of autonomous mobile nodes with wireless transmission capability without using any existing infrastructure or centralized administration. The MANET environment is particularly vulnerable due to its dynamic topology, less powerful mobile devices and distributed environment. Current solutions for security are more geared towards wired networks. Therefore, they are not applicable for wireless ad hoc networks and cannot be applied without modifications in this environment. In this paper, we classify the techniques for intrusion detection systems (IDS) that have been introduced for MANETs, and compare some important aspects such as performance and overhead in these techniques. Finally we provide some directions for further research.

Highlights

  • Mobile ad hoc network is a network consisting of mobile nodes (Laptop, Personal Digital Assistants (PDAs) and wireless phones) with the characteristics of self-organization and self-configuration which enable it to form a new network quickly

  • If the packet overheard from B matches what is stored in the buffer, it means that B really forwards to the hop

  • Huang and Lee (Huang Y, Lee W, 2003) proposed a Cooperative Intrusion Detection System based on clustering approaches was similar to Kachirski and Guha’s system (Kachirski O, Guha R, 2003)

Read more

Summary

Introduction

Mobile ad hoc network is a network consisting of mobile nodes (Laptop, Personal Digital Assistants (PDAs) and wireless phones) with the characteristics of self-organization and self-configuration which enable it to form a new network quickly. Deploying security in mobile ad hoc networks is important (Zhang Y, Lee W, Huang Y, 2003). To resist against attacks, a second wall is needed which is Intrusion Detection (ID) that Monitoring activities for policy violation in mobile ad hoc networks. These two mechanisms should act together to ensure high security requirements (Mishra A, Nadkarni K, Patcha A, 2004). Misuse detection has a low error rate (false positives rate) on known attacks but anomaly detection is the only means to catch new attacks (Zhang Y, Lee W, Huang Y, 2003). Signature-based schemes provide very good detection results for specified, well-known attacks They are not capable of detecting new, unfamiliar intrusions, even if they www.ccsenet.org/cis. Many intrusion detection techniques for MANET have been proposed that some of which will be discussed (Huang Y, Lee W, 2003)

Intrusion Detection Techniques in Mobile Ad hoc Networks
Watchdog
Pathrater
Routeguard
Hop-by-hop signing
Patwardhan secure routing and intrusion detection system
ExWatchdog
CONFIDANT
Cooperative Intrusion Detection System
Snooping packets technique
Comparison of intrusion detection techniques
Findings
Conclusion and Discussion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.