A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS

Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis

2010

Abstract

This paper proposes a novel Intrusion Detection System (IDS) for Mobile Ad Hoc Networks (MANETs) that aims at overcoming the limitations and weaknesses of the existing IDSs. The proposed IDS incorporates a novel random walk-based IDS architecture as well as a multi-layer, specification-based detection engine. The proposed solution does not belong to any of the existing intrusion detection approaches, since it relies on a set of robust, self-contained Random Walk Detectors (RWDs), which may freely move from node to node and randomly traverse a network, while monitoring each visiting node for malicious behaviour. RWDs exhibit a number of benefits including locality, simplicity, low overhead, and robustness to changes in topology. Moreover, the multi-layer, specification-based engine monitors the transport, network and data link layers of the protocol stack, providing an integrated solution capable of detecting the majority of security attacks occurring in MANETs.

References

  1. Mishra, A., Nadkarni, K., Patcha, A., 2004. Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60.
  2. Djenouri, D., Khelladi, L., Badache, N., 2005. A Survey of Security Issues in Mobile Ad Hoc Networks. IEEE Communications Surveys, Vol. 7, No. 4.
  3. Yang, H., Luo, H., Ye, F., Lu. S., Zhang, L., 2004. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications Surveys, Vol. 11, No 1, pp. 38-47.
  4. Sen, S., Clark, J. A., 2009. Intrusion Detection in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks, S. Misra, I. Woungang, S.C. Misra (Eds.), Springer, p. 427-454.
  5. Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C-Y., Bowen, T., Levitt, K., Rowe, J., 2005. A General Cooperative Intrusion Detection Architecture for MANETs. Proceedings of the third IEEE International Workshop on Information Assurance, pp. 57 - 70.
  6. Nadkarni, K., Mishra, A., 2004. A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks. IEEE Wireless Communications and Networking Conference (WCNC. 2004), vol. 2, pp. 831 - 836.
  7. Sun, B., Wu, K., Xiao, Y., Wang, R., 2007. Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems, vol. 20, Issue 6, pp. 695 - 721.
  8. Lovasz, L., 1996. Random walks on graphs: a survey. Combinatorics: Paul Erdos is eighty (Keszthely, Hungary, 1993), vol. 2, edited by D. Miklos et al., Bolyai Soc. Math. Stud. 2, J anos Bolyai Math. Soc., pp. 353-397.
  9. Kogias, D., Oikonomou, K., Stavrakakis, I., 2008. Replicated Random Walks for Service Advertising in Unstructured Environments", to appear in the 7th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 23-27, Palma de Mallorca, Spain.
  10. Daemen, J., Rijmen, V., 2002. The Design of Rijndael, AES - The Advanced Encryption Standard. Springer Verlag, pp. 238.
  11. Miller, V., 1986. Uses of Elliptic Curves in Cryptography,” Proceedings of Crypto 7885, LNCS 218, Springer-Verlag, pp. 417-426.
  12. Li, S., Ephremides, A., 2009. Covert Channels in Ad-Hoc Wireless Networks. Elsevier Ad Hoc Networks.
  13. Tseng. C.-Y., et al., 2003. A specification-based intrusion detection system for AODV. In proceedings. of ACM Workshop on Security of ad hoc and sensor networks.
  14. Huang, Y., Lee, W., 2004. Attack analysis and detection for ad hoc routing protocols. In proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04).
  15. Orset, J., Alcalde, B., Cavalli,A., 2005. An EFSM-based intrusion detection system for ad hoc networks. In proceedings of the 3rd international symposium on Automated technology for verification and analysis, (ATVA 2005),Taipei, Taiwan.
  16. Potlapally, N. R., Ravi, S., Raghunathan, A., Jha, N. K., 2006. A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transactions on Mobile Computing, v.5 n.2, p.128-143.
Download


Paper Citation


in Harvard Style

Panos C., Xenakis C. and Stavrakakis I. (2010). A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 25-34. DOI: 10.5220/0002989100250034


in Bibtex Style

@conference{secrypt10,
author={Christoforos Panos and Christos Xenakis and Ioannis Stavrakakis},
title={A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={25-34},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002989100250034},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
SN - 978-989-8425-18-8
AU - Panos C.
AU - Xenakis C.
AU - Stavrakakis I.
PY - 2010
SP - 25
EP - 34
DO - 10.5220/0002989100250034