Skip to main content

A Scheme for Intrusion Detection and Response in Ad Hoc Networks

  • Chapter
Book cover New Technologies, Mobility and Security

Abstract

The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing and detecting attacks in these networks. In this paper, we propose three schemes for intrusion detection in ad hoc networks and demonstrate their effectiveness by applying them to the wormhole attack. The first scheme is based on attack graphs, the second is based on the theory of the diffusion of innovations and the third is based on the aggregation lists of events. The advantages and disadvantages of each scheme are identified and a combined model for intrusion detection is presented. Furthermore, a response module is proposed to augment the intrusion detection functions

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anantvalee T, Wu J (2006) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. Wireless/Mobile Network Security: Springer 2006, Ch7, pp. 170–196.

    Google Scholar 

  2. Tseng C, Song T, Balasubramanyam P, Ko C, Levitt K (2005) “A Specification-Based Intrusion Detection Model for OLSR”. RAID 2005, pp. 330–350.

    Google Scholar 

  3. Perkins CE, Royer EM (2000) The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins editor, Ad hoc Networking, Addison-Wesley, 2000, pp. 173–219.

    Google Scholar 

  4. Khalil I, Bagchi S, Shroff NB (2005) “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.” dsn, 2005 International Conference on Dependable Systems and Networks (DSN’05), pp. 612–621.

    Google Scholar 

  5. Hu YC, Perrig, A, Johnson DB (2003) “Packet leashes: A defense against wormhole attacks in wireless network,.” INFOCOM. (2003).

    Google Scholar 

  6. Capkun S, Buttyan L, Hubaux J (2003) “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. ”ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 1–12 Washington, USA, Oct 2003.

    Google Scholar 

  7. Wang, W, Bhargava, B. Lu, Y. and Wu, X. “Defending against Wormhole Attacks in Mobile Ad Hoc Networks,” preprint, http:/www.cs.purdue.edu/homes/wangwc/papers/MC2R sample101104.pdf

    Google Scholar 

  8. Hu L, Evans D (2004) “Using Directional Antennas to Prevent Wormhole Attacks.” Network and Distributed System Security Symposium (NDSS), San Diego, Feb 2004.

    Google Scholar 

  9. Vassilaras S, Vogiatzis D, Yovanof G (2005) “Misbehavior Detection in Clustered Ad-hoc Networks with Central Control,” itcc, pp. 687–692, International Conference on Information Technology: Coding and Computing (ITCC’05) - Volume II, 2005.

    Article  Google Scholar 

  10. Wang X (2006) “Intrusion Detection Techniques in Wireless Ad Hoc Networks.” compsac, oo. 347–349, 30th Annual International Computer Software and Applications Conference (COMPSAC’06), 2006.

    Google Scholar 

  11. Zhang Y, Liu W, Lou W, Fang Y (2005) Securing sensor networks with location-based keys, WCNC 2005 - IEEE Wireless Communications and Networking Conference, no. 1, March 2005, pp. 1909–1914.

    Google Scholar 

  12. Song N, Qian L, Li X (2005) “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach,” ipdps, p.289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS’05) - Workshop 17, 2005.

    Google Scholar 

  13. Buttyan L, Dora L, Vajda I (2005) “Statistical wormhole detection in sensor networks,” Hungary, July 2005.

    Google Scholar 

  14. Wang W, Bhargava B (2004) “Visulization of wormholes in sensor networks,” Proceeding of the ACMWorkshop onWireless Security (WiSe), pages pp. 51–60, 2004.

    Google Scholar 

  15. Azer M, El-Kassas S, El-Soudani M (2006) “Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.,” SECRYPT 2006, pp. 63–68.

    Google Scholar 

  16. Daley K, Larson R, Dawkins J (2002) “A Structural Framework for Modeling Multi-Stage Network Attacks,” icppw, p. 5, 2002 International Conference on Parallel Processing Workshops (ICPPW’02), 2002.

    Google Scholar 

  17. Forde T, Doyle L, O’Mahony D (2006) Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks. IEEE Communications Magazine, vol.v 44, no. 4, April 2006.

    Google Scholar 

  18. Aime M, Calandriello G, Lioy A (2006) “A Wireless Distributed Intrusion Detection System and a New Attack Model,” iscc, pp. 35–40, 11th IEEE Symposium on Computers and Communications (ISCC’06), 2006.

    Google Scholar 

  19. Foo B, Wu Y, Mao Y, Bagchi S, Spafford E (2005) “ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment,” dsn, pp. 508–517, 2005 International Conference on Dependable Systems and Networks (DSN’05), 2005.

    Google Scholar 

  20. Watkins D, Scott C, Randle D (2006) “A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets,” pp. 253–260, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’06), 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this chapter

Cite this chapter

Azer, M.A., El-Kassas, S.M., El-Soudani, M.S. (2007). A Scheme for Intrusion Detection and Response in Ad Hoc Networks. In: Labiod, H., Badra, M. (eds) New Technologies, Mobility and Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6270-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6270-4_42

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6269-8

  • Online ISBN: 978-1-4020-6270-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics