A Survey of Secure Intrusion Detection Systems for MANET
Abstract
Migrating from wired network to wireless network has
been a global trend. Mobile Ad hoc NETwork (MANET) is one of
the most unique and vital applications. MANET does not require a
fixed network infrastructure; every node behaves as both transmitter
and receiver. Nodes can communicate directly if they are in the
same communication range. Otherwise, they rely on neighbours to
communicate the messages. MANET is popular in military
applications because of its self configuring ability. However,
because of the open medium and the wide distribution of nodes, the
MANET is vulnerable to malicious attacks. So it is very important
to develop an efficient intrusion-detection system to protect MANET
from attacks.
In this paper, there is a survey of IDS specially designed for
MANETs. EAACK is capable of detecting malicious nodes despite
the existence of false misbehavior reports. Compared to
contemporary approaches, EAACK demonstrates higher maliciousbehavior-
detection rates in certain circumstances while does not
greatly affect the network performance.
Full Text:
PDFReferences
ElhadiM.Shakshuki, Senior Member, IEEE, Nan Kang, and
TarekR.Sheltami, Member, IEEE TRANSACTIONS ON INDUSTRIAL
ELECTRONICS, VOL. 60, NO. 3, MARCH 2013.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing
misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Int.Conf.
Mobile Comput.Netw., Boston, MA, 2000, pp. 255-526.
Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. 2009.
Video Transmission Enhancement in Presence of Misbehaving Nodes in
MANETs.
T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in MobileAd
Hoc Networks,” in Wireless/Mobile Security. New York: Springer-Verlag,
J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion
detectionand response for mobile ad hoc networks,” in Proc. IEEE Int.
Conf.Perform., Comput., Commun., 2004, pp 747-752.
A. Patcha and A. Mishra, “Collaborative security architecture for
blackhole attack prevention in mobile ad hoc networks”, in Proc. Radio
WirelessConf., 2003,pp.75-78.
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis,
“Securerouting and intrusion detection in ad hoc networks,” in Proc.
rd Int. Conf.Pervasive Comput.Commun.,2005,pp. 191-199.
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining
digitalsignatures and public-key c ryptosystems,” Commun. ACM, vol. 21,
no. 2,pp. 120-126, Feb. 1983.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology