Abstract
A Mobile Ad hoc Network (MANET) consists of a group of autonomous mobile nodes with wireless transmission capability without using any existing infrastructure or centralized administration. The MANET environment is particularly vulnerable due to its dynamic topology, less powerful mobile devices and distributed environment. Current solutions for security are more geared towards wired networks. Therefore, they are not applicable for wireless ad hoc networks and cannot be applied without modifications in this environment. In this paper, we classify the techniques for intrusion detection systems (IDS) that have been introduced for MANETs, and compare some important aspects such as performance and overhead in these techniques. Finally we provide some directions for further research.
Highlights
Mobile ad hoc network is a network consisting of mobile nodes (Laptop, Personal Digital Assistants (PDAs) and wireless phones) with the characteristics of self-organization and self-configuration which enable it to form a new network quickly
If the packet overheard from B matches what is stored in the buffer, it means that B really forwards to the hop
Huang and Lee (Huang Y, Lee W, 2003) proposed a Cooperative Intrusion Detection System based on clustering approaches was similar to Kachirski and Guha’s system (Kachirski O, Guha R, 2003)
Summary
Mobile ad hoc network is a network consisting of mobile nodes (Laptop, Personal Digital Assistants (PDAs) and wireless phones) with the characteristics of self-organization and self-configuration which enable it to form a new network quickly. Deploying security in mobile ad hoc networks is important (Zhang Y, Lee W, Huang Y, 2003). To resist against attacks, a second wall is needed which is Intrusion Detection (ID) that Monitoring activities for policy violation in mobile ad hoc networks. These two mechanisms should act together to ensure high security requirements (Mishra A, Nadkarni K, Patcha A, 2004). Misuse detection has a low error rate (false positives rate) on known attacks but anomaly detection is the only means to catch new attacks (Zhang Y, Lee W, Huang Y, 2003). Signature-based schemes provide very good detection results for specified, well-known attacks They are not capable of detecting new, unfamiliar intrusions, even if they www.ccsenet.org/cis. Many intrusion detection techniques for MANET have been proposed that some of which will be discussed (Huang Y, Lee W, 2003)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.