A Survey of Secure Intrusion Detection Systems for MANET

Priyanka Bhavsar, Bhushan Thakare, Hemant Deshmukh


Migrating from wired network to wireless network has
been a global trend. Mobile Ad hoc NETwork (MANET) is one of
the most unique and vital applications. MANET does not require a
fixed network infrastructure; every node behaves as both transmitter
and receiver. Nodes can communicate directly if they are in the
same communication range. Otherwise, they rely on neighbours to
communicate the messages. MANET is popular in military
applications because of its self configuring ability. However,
because of the open medium and the wide distribution of nodes, the
MANET is vulnerable to malicious attacks. So it is very important
to develop an efficient intrusion-detection system to protect MANET
from attacks.
In this paper, there is a survey of IDS specially designed for
MANETs. EAACK is capable of detecting malicious nodes despite
the existence of false misbehavior reports. Compared to
contemporary approaches, EAACK demonstrates higher maliciousbehavior-
detection rates in certain circumstances while does not
greatly affect the network performance.

Full Text:



ElhadiM.Shakshuki, Senior Member, IEEE, Nan Kang, and



S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing

misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Int.Conf.

Mobile Comput.Netw., Boston, MA, 2000, pp. 255-526.

Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. 2009.

Video Transmission Enhancement in Presence of Misbehaving Nodes in


T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in MobileAd

Hoc Networks,” in Wireless/Mobile Security. New York: Springer-Verlag,

J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion

detectionand response for mobile ad hoc networks,” in Proc. IEEE Int.

Conf.Perform., Comput., Commun., 2004, pp 747-752.

A. Patcha and A. Mishra, “Collaborative security architecture for

blackhole attack prevention in mobile ad hoc networks”, in Proc. Radio

WirelessConf., 2003,pp.75-78.

A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis,

“Securerouting and intrusion detection in ad hoc networks,” in Proc.

rd Int. Conf.Pervasive Comput.Commun.,2005,pp. 191-199.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining

digitalsignatures and public-key c ryptosystems,” Commun. ACM, vol. 21,

no. 2,pp. 120-126, Feb. 1983.


Copyright © IJETT, International Journal on Emerging Trends in Technology