Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks

rakesh sharma

Abstract


ABSTRACT

Mobile circumstantial networks and wireless detector networks have secure a large form of applications. However, they are usually deployed in probably adverse or perhaps hostile environments. Therefore, they cannot be without delay deployed while not first addressing security challenges. Intrusion detection systems offer a necessary layer of in-depth protection for wired networks. However, comparatively very little analysis has been performed regarding intrusion detection within the areas of mobile ad-hoc networks and wireless sensor networks. During this article, first we tend to shortly introduce mobile ad-hoc networks and wireless sensor networks and their security issues. Then, we tend to concentrate on their intrusion detection capabilities. Specifically, we tend to gift the challenge of constructing intrusion detection systems for mobile ad-hoc networks and wireless sensor networks, survey the prevailing intrusion detection techniques, and indicate vital future analysis directions.


Keywords


Keywords: mobile ad-hoc networks, wireless sensor networks, attacks, AODV, IDS, secure aggregation

Full Text:

PDF

References


I. F. Akyildiz et al., “Wireless Sensor Networks: A Survey,†Elsevier Comp. Networks, vol. 38, no. 2, 2002, pp. 393–422.

Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,†ACM Wireless Networks, vol. 9, no. 5, Sept. 2003, pp. 545–56.

H. Debar, M. Dacier, and A. Wespi, “A Revised Taxonomy for Intrusion Detection Systems,†Annales des Telecommun., vol. 55, 2000, pp. 361–78.

Y. Huang et al., “Cross-Feature Analysis for Detecting Ad-hoc Routing Anomalies,†Proc. IEEE ICDCS ’03, Providence, RI, May 2003, pp. 478–87.

Y. Huang, and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,†ACM SASN ’03, Fairfax, VA, 2003, pp. 135–47.

Y. Huang, and W. Lee, “Attack Analysis and Detection for Ad Hoc Routing Protocols,†Proc. RAID ’04, French Riviera, France, Sept. 2004, pp. 125–45.

S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,†ACM Mobicom 2000,

Boston, MA, Aug. 2000, pp. 255–65.

C.-Y. Tseng et al., “A Specification-based Intrusion Detection System for AODV,†ACM SASN ’03, Fairfax,VA, 2003, pp. 125–34.

B. Sun, K. Wu, and U. Pooch, “Alert Aggregation in Mobile Ad-Hoc Networks,†ACM WiSe ’03 in conjunction with ACM Mobicom ’03, San Diego, CA, 2003, pp. 69–78

B. Sun et al., “Integration of Mobility and Intrusion Detection for Wireless Ad Hoc Networks,†Wiley Int’l. J.Commun. Sys., vol. 20, no. 6, June 2007, pp. 695–721.

W. Du, L. Fang, and P. Ning, “LAD: Localization Anomaly Detection for Wireless Sensor Networks,†J.Parallel and Distrib. Comp., vol. 66, no. 7, July 2006, pp. 874–86.

D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,†ACM/IEEE IPSN ’05,Los Angeles, CA, Apr. 2005, pp. 99–106.

D. Wagner, “Resilient Aggregation in Sensor Networks,†ACM SASN ’04, Washington DC, 2004, pp. 78–87.

Y. Yang et al., “SDAP: A Secure Hop-by- Hop Data Aggregation Protocol for Sensor Networks,†ACM Mobihoc ’06, Florence, Italy, 2006, pp. 356–67.

L. Buttyán, P. Schaffer, and I. Vajda, “RANBAR: RANSACBased Resilient Aggregation in Sensor Networks,†ACM SASN ’06, Alexandria, VA, 2006, pp. 83–90.

B. Sun et al., “Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks,â€IEEE ICC ’07, Glasgow, U.K., June 2007.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)