Skip to main content

An Optimal Method for Detecting Internal and External Intrusion in MANET

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 120))

Abstract

Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sun, B., Osborne, A.: intrusion detection techniques in mobile ad hoc and wireless sensor - network. IEEE Wireless Communications, 56–63 (2007)

    Google Scholar 

  2. Lima, M., Santos, A., Pujolle, G.: A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications surveys & tutorials, 66–77 (2009)

    Google Scholar 

  3. García-Teodoroa, G., Díaz-Verdejoa, J., Maciá-Fernándeza, G., Vázquezb, E.: Anomaly-based network intrusion detection. Techniques, Systems and Challenges, pp. 18–28. Elsevier, Amsterdam (2009)

    Google Scholar 

  4. Hu, Y., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 28–39 (2004)

    Google Scholar 

  5. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. In: IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, WIMOB, pp. 608–612 (2008)

    Google Scholar 

  6. Seshadri Ramana I, K., Chari, A., Kasiviswanth, N.: A Survey on trust Management for mobile ad hoc networks. International Journal of Network Security & Its Applications (IJNSA), 75–85 (2010)

    Google Scholar 

  7. Jiang, X., Lin, C., Yin, H., Chen, Z., Su, L.: Game-based Trust Establishment for Mobile Ad Hoc Networks. In: IEEE International Conference on Communications and Mobile Computing, CMC, pp. 475–479 (2009)

    Google Scholar 

  8. Eschenauer, L., Gligor, V., Baras, J.: Trust establishment in mobile ad-hoc networks. In: Proceedings of the Security Protocols Workshop, Cambridge (2002)

    Google Scholar 

  9. Ren, K., Li, T., Wan, Z., Bao, F., Deng, R.H., Kim, K.: Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6), 687–699 (2004)

    Article  MATH  Google Scholar 

  10. Morris, P.: Introduction to Game Theory, 1st edn. Springer, Heidelberg (1994)

    Book  MATH  Google Scholar 

  11. Ganchev, A., Narayanan, L., Shende, S.: Games to induce specified equilibriaI. Theoretical Computer Science, pp. 341–350. Elsevier, Amsterdam (2008)

    MATH  Google Scholar 

  12. Patchay, A., Min Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, pp. 280–284 (2004)

    Google Scholar 

  13. Wang, K., Wu, M., Shen, S.: A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. In: IEEE 50th International Conference on Information Technology: New Generations 2008, pp. 1000–1005 (2008)

    Google Scholar 

  14. Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 135–147 (2003)

    Google Scholar 

  15. Kachirski, O., Guha, R.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: 36th Annual Hawaii International Conference on System Sciences, pp. 57.1 (2003)

    Google Scholar 

  16. Mohammed, N., Otrok, H., Wang, L., Debbabi, M., Bhattacharya, P.: A mechanism design-based multi-leader election scheme for intrusion detection in MANET. In: Wireless Communications and Networking Conference, WCNC, pp. 2816–2821 (2008)

    Google Scholar 

  17. Dagadeviren, O., Erciyes, K.: A Hierarchical Leader Election Protocol for Mobile Ad Hoc Network. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part I. LNCS, vol. 5101, pp. 509–518. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  18. Mas-Colell, A., Whinston, M., Green, J.: Microeconomic Theory. Oxford University Press, New York (1995)

    MATH  Google Scholar 

  19. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad-hoc networks. Computer Communications. Elsevier Journal, 708—721 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rafsanjani, M.K., Aliahmadipour, L., Javidi, M.M. (2010). An Optimal Method for Detecting Internal and External Intrusion in MANET. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17604-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17603-6

  • Online ISBN: 978-3-642-17604-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics