Skip to main content

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3470))

Abstract

The mobile ad hoc networks are particularly vulnerable to intrusion, as its features of open medium, dynamic changing topology, cooperative routing algorithms. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features, because no matter how secure the mobile ad hoc networks, its is still possible the nodes are compromised and become malicious. In this paper, we propose a novel intrusion detection approach for mobile ad hoc networks by using finite state machine. We construct the finite state machine (FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes cooperatively monitor every node’s behaviour by the FSM. Our approach can detect real-time attacks without signatures of intrusion or trained data. Finally, we evaluate the intrusion detection method through simulation experiments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Haas, Z.J.: Securing ad hoc networks IEEE Networks Special Issue on Network Security (November/December 1999)

    Google Scholar 

  2. Capkun, S., Nuttyan, L., Hubaux, J.-P.: Self-organized public-key Management for mobile ad hoc networks. IEEE Transactions on mobile computing 2(1) (January-March 2003)

    Google Scholar 

  3. Chan, A.: Distributed Symmetric Key Management for Mobile Ad hoc Networks. In: IEEE INFOCOM 2004, Hong Kong (March 2004)

    Google Scholar 

  4. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), June 2002, pp. 3–13. IEEE, Calicoon (2002)

    Google Scholar 

  5. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28 (2002)

    Google Scholar 

  6. Zhang, Y., Lee, W.: Intrusion Detection Techniques for Mobile Wireless Networks, Mobile Networks and Applications (2003)

    Google Scholar 

  7. Kachirski, O., Guha, R.: Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. In: IEEE Workshop on Knowledge Media Networking, KMN 2002 (2002)

    Google Scholar 

  8. Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). In: Internet-Draft, draft-ietf-manet-dsr-09.txt, April 15 (2003), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt

  9. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)

    Google Scholar 

  10. Puttini, R.S., Percher, J.-M., Mé, L., Camp, O., de Sousa Jr., R., Barenco Abbas, C.J., Garcia Villalba, L.J.: A Modular Architecture for Distributed IDS in MANET. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668. Springer, Heidelberg (2003).

    Google Scholar 

  11. Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, VA, USA, October 31 (2003)

    Google Scholar 

  12. Sun, B., Wu, K., Pooch, U.W.: Routing Anomaly Detection in Mobile Ad Hoc Networks. In: Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 2003), Dallas, Texas, October 2003, pp. 25–31 (2003)

    Google Scholar 

  13. Albers, P., Camp, O., Percher, J.-M., Jouga, B., Mé, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002) (April 2002)

    Google Scholar 

  14. Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering SE-13, 222–232 (1987)

    Article  Google Scholar 

  15. Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks. In: Vehicular Technology Conference, vol. 4, pp. 2143–2147 (2001)

    Google Scholar 

  16. Wang, W., Lu, Y.,Bharat, K.B.: On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol. In: Proceedings of 10th IEEE International Conference on Telecommunication (ICT), p. 16 (2003)

    Google Scholar 

  17. http://www.isi.edu/nsnam/ns/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yi, P., Zhong, Y., Zhang, S. (2005). A Novel Intrusion Detection Method for Mobile Ad Hoc Networks. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_121

Download citation

  • DOI: https://doi.org/10.1007/11508380_121

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26918-2

  • Online ISBN: 978-3-540-32036-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics