skip to main content
10.1145/3195612.3195617acmotherconferencesArticle/Chapter ViewAbstractPublication Pageshp3cConference Proceedingsconference-collections
research-article

A behavioural theory for intrusion detection system in mobile ad-hoc networks

Published: 15 March 2018 Publication History

Abstract

We propose a Calculi in process algebraic framework to formally model Intrusion Detection System (IDS) for secure routing in Mobile Ad-hoc Networks. The proposed calculi, named as dRi, is basically an extension of Distributed pi calculus (Dpi). The calculi models unicast, multicast & broadcast communication, node mobility, energy conservation at node and detection of malicious node(s) in Mobile Ad-hoc Networks. The Calculi has two syntactic categories: one for describing nodes and another for processes which reside in nodes. We also present two views of semantic reductions; one as reduction on configurations whereas another as LTSs (Labelled Transition Systems), behavioural semantics, where reduction on configurations are described on various actions. We present an example described using LTSs to show the capability of the proposed calculi. We define a bisimulation based equivalence between configurations. Further we define a touch-stone equivalence on its reduction semantics & also present prove outline for bisimulation based equivalence that can be recovered from its touch-stone equivalence and vice-versa.

References

[1]
Mehdi Alilou, Mehdi Dehghan.t, April 2005, Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks, Transactions on Engineering, Computing And Technology V5 ISSN 1305--5313
[2]
Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang, February 2004, Security In Mobile Ad Hoc Networks: Challenges And Solutions, IEEE Wireless Communications
[3]
W. Liu and Y. Fang, 2004, SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, Proc. IEEE INFOCOM 2004
[4]
Y. Hu, A. Perrig, and D. B. Johnson, Apr. 2003, Packet Leashes: A defense against Wormhole Attacks in Wireless Ad Hoc Networks, Proc. IEEE INFOCOM 2003, vol. 3, pp. 1976--86.
[5]
S. Buchegger and J. L. Boudec, 2002, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks, Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC)
[6]
Y. Wang, G. Attebury, and B. Ramamurthy, Apr. 2006, A Survey of Security Issues in Wireless Sensor Networks, IEEE Commun. Surveys & Tutorials, vol. 8, no. 2
[7]
Y. Hu and A. Perrig, 2004, A Survey of Secure Wireless Ad Hoc Routing, IEEE Computer Society.
[8]
Y. Hu and D. B. Johonson, 2004, Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks, Proc. ACM SASN 04, Oct. 20.
[9]
Xing, Fei, and Wenye Wang, 2006, Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes, IEEE International Conference on Communications, vol. 4, pp. 1879--1884.
[10]
Henrik Lundgren, 2002, Implementation and Real-world Evaluation of Routing Protocols for Wireless Ad hoc Networks, Licentiate thesis, Uppsala University.
[11]
Hans Huttel, Willard Thor Rafnsson, Secrecy in Mobile Adhoc Networks available at http://www.cse.chalmers.se/rafnsson/article.pdf
[12]
Mihai-Lica Pura, Victor-Valeriu Patriciu, Ion Bica, 2009, Modeling and formal verification of implicit ondemand secure ad hoc routing protocols in HLPSL and AVISPA, International Journal of Computers and Communications, Issue 2, Volume 3, pp. 25--32
[13]
Remy Chretien, Stephanie Delaune, Formal analysis of privacy for routing protocols in mobile ad hoc networks
[14]
Xu Donghong1, Jiang Shujuan, Qi Yong, 2010, Security Properties Analysis of Routing Protocol for MANET, Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pages 405--408, IEEE Computer Society Press
[15]
Massimo Merro, 2009, An Observational Theory for Mobile Ad Hoc Networks (full version), Information and Computation, vol. 207, issue 2, pp. 194--208
[16]
Amitabh Mishra, Ketan Nadkarni, and Animesh Patcha, 2004, Intrusion detection in wireless ad hoc networks, IEEE wireless communications 11.1, pp. 48--60
[17]
Parul Yadav and Manish Gaur, 2015, A Survey on Formal Modelling for Secure Routing in Mobile Ad hoc Networks, Proc. International Conference on Distributed Computing and Internet Technology
[18]
Parul Yadav and Manish Gaur, 2018, A Process Calculi for Intrusion Detection System in Mobile Ad-hoc Networks, Journal of Communications (JCM)
[19]
Sebastian Nanz, Chris Hankin, 2006, A Framework for Security Analysis of Mobile Ad Hoc Networks, Electronic Notes in Theor. Comp. Sci., vol.367, issue 1, pp. 203--227
[20]
Martin Abadi, Bruno Blanchet, 2005, Analyzing Security Protocols with Secrecy Types and Logic Program, Journal of the ACM 52, pp. 102--146
[21]
M. Abadi, C. Fournet, 2001, Mobile values, new names, and secure communication, In Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp 104--115. ACM Press
[22]
V. Cortier, J. Degrieck, S. Delaune, 2012, Analysing routing protocols: four nodes topologies are sufficient, In Proc. of the 1st International Conference on Principles of Security and Trust (POST'12), LNCS, pp 30--50. Springer.

Index Terms

  1. A behavioural theory for intrusion detection system in mobile ad-hoc networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HP3C: Proceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications
    March 2018
    123 pages
    ISBN:9781450363372
    DOI:10.1145/3195612
    • Conference Chair:
    • Steven Guan
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. formal framework for security in MANETs
    2. full-abstraction for intrusion detection system in MANETs
    3. process algebra for IDS

    Qualifiers

    • Research-article

    Conference

    HP3C 2018

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media