Abstract
The mobile ad hoc networks are particularly vulnerable to intrusion, as its features of open medium, dynamic changing topology, cooperative routing algorithms. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features, because no matter how secure the mobile ad hoc networks, its is still possible the nodes are compromised and become malicious. In this paper, we propose a novel intrusion detection approach for mobile ad hoc networks by using finite state machine. We construct the finite state machine (FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes cooperatively monitor every node’s behaviour by the FSM. Our approach can detect real-time attacks without signatures of intrusion or trained data. Finally, we evaluate the intrusion detection method through simulation experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Zhou, L., Haas, Z.J.: Securing ad hoc networks IEEE Networks Special Issue on Network Security (November/December 1999)
Capkun, S., Nuttyan, L., Hubaux, J.-P.: Self-organized public-key Management for mobile ad hoc networks. IEEE Transactions on mobile computing 2(1) (January-March 2003)
Chan, A.: Distributed Symmetric Key Management for Mobile Ad hoc Networks. In: IEEE INFOCOM 2004, Hong Kong (March 2004)
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), June 2002, pp. 3–13. IEEE, Calicoon (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28 (2002)
Zhang, Y., Lee, W.: Intrusion Detection Techniques for Mobile Wireless Networks, Mobile Networks and Applications (2003)
Kachirski, O., Guha, R.: Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. In: IEEE Workshop on Knowledge Media Networking, KMN 2002 (2002)
Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). In: Internet-Draft, draft-ietf-manet-dsr-09.txt, April 15 (2003), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)
Puttini, R.S., Percher, J.-M., Mé, L., Camp, O., de Sousa Jr., R., Barenco Abbas, C.J., Garcia Villalba, L.J.: A Modular Architecture for Distributed IDS in MANET. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668. Springer, Heidelberg (2003).
Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, VA, USA, October 31 (2003)
Sun, B., Wu, K., Pooch, U.W.: Routing Anomaly Detection in Mobile Ad Hoc Networks. In: Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 2003), Dallas, Texas, October 2003, pp. 25–31 (2003)
Albers, P., Camp, O., Percher, J.-M., Jouga, B., Mé, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002) (April 2002)
Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering SE-13, 222–232 (1987)
Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks. In: Vehicular Technology Conference, vol. 4, pp. 2143–2147 (2001)
Wang, W., Lu, Y.,Bharat, K.B.: On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol. In: Proceedings of 10th IEEE International Conference on Telecommunication (ICT), p. 16 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yi, P., Zhong, Y., Zhang, S. (2005). A Novel Intrusion Detection Method for Mobile Ad Hoc Networks. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_121
Download citation
DOI: https://doi.org/10.1007/11508380_121
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26918-2
Online ISBN: 978-3-540-32036-4
eBook Packages: Computer ScienceComputer Science (R0)