A mobile Ad-hoc network (Mobile Ad-Hoc Network) is a self-created self-organized and self administering set of nodes connected via wireless links without the aid of any fixed infrastructure or
centralized administrator. Security has become important to mobile ad hoc networks (Mobile Ad-Hoc
Network). Due to its unique features such as limited power and limited bandwidth, open nature, lack of
infrastructure and central management, node mobility and change of dynamic topology. It is mainly use
for many intelligent missions and life-critical applications. However, the broadcast nature of inter-node
communications and node mobility in Mobile Ad-Hoc Network make it very challenging to secure.
Moreover, their constantly changing topology causes network node density and neighbor relationships to
change dynamically. The prevention methods like authentication and cryptography techniques alone are
not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be
deployed to facilitate the identification and isolation of attacks. The Intrusion Detection Systems utilizes
are: (i) both anomaly and misuse detection schemes to identify attacks in Mobile Ad-Hoc Network and
(ii) mobile agents (MAs) to augment each node’s intrusion-detection capability. In particular, each node is
equipped with local IDS, and MAs will be dispatched periodically or on- demand to augment each node’s
IDS. We present the design of these IDS and the overall network structure, as well as the methods for
authenticating and dispatching MAs. This paper presents an intrusion detection system (IDS) for Mobile
Ad-Hoc Network
Download PDF
References
- Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, “An Acknowledgment-Based Approach for the Detection of Routing Misbehaviour in Mobile Ad-Hoc Network”, IEEE Transactions on mobile computing, Vol. 6, NO. 5, May 2007.
- Dhanalakshmi, Dr.M.Rajaram ,” A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”,IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, Oct,2008.
- Zan Kai Chong1, Moh Lim Sim1, Hong Tat Ewe2, and Su Wei Tan ,” Separation of Detection Authorities (SDA) Approach for Misbehavior Detection in Wireless Ad Hoc Network”,PIERS ONLINE, VOL. 4, NO. 8, 2008.
- Ayyaswamy Kathirvel, Rengaramanujam Srinivasan, “A System of Umpires for Security of Wireless Mobile Ad Hoc Network”, In (International Arab Journal of e-Technology, Vol. 1, No. 4, June 2010) Faculty of Computer Science and Engineering, B.S.Abdur Rahman University, India
- W. Jansen, P. Mell, T. Karygiannis, and D. Marks, “Applying Mobile Agents to Intrusion Detection and Response,” in NIST Interim Report (IR) 6416, October 1999.
- T. Park and K. G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 4, no. 3, pp. 297–309, May/June 2005
- A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, “SWATT: SoftWarebased ATTestationfor Embedded Devices,” in Proceedings of the IEEE Symposium on Security and Privacy, May 2004
- S.Madhavi and Dr. Tai Hoon Kim “An Intrusion Detection System in Mobile Ad hocNetworks” International Journal of Security and its Application, 2, No 3, July 2008.
- T. Sander and C. F. Tschudin, “Towards Mobile Cryptography,” in Proceedings of the IEEE Symposium on Security and Privacy, May 1998
- P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks,” in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.
- S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, Pp. 255-265, 2000
- S.Sen and John Andrew Clark “A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks” March 2009, WiSec ’09: Proceedings of the Second ACM Conference on Wireless Network Security
Back