Abstract
The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing and detecting attacks in these networks. In this paper, we propose three schemes for intrusion detection in ad hoc networks and demonstrate their effectiveness by applying them to the wormhole attack. The first scheme is based on attack graphs, the second is based on the theory of the diffusion of innovations and the third is based on the aggregation lists of events. The advantages and disadvantages of each scheme are identified and a combined model for intrusion detection is presented. Furthermore, a response module is proposed to augment the intrusion detection functions
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anantvalee T, Wu J (2006) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. Wireless/Mobile Network Security: Springer 2006, Ch7, pp. 170–196.
Tseng C, Song T, Balasubramanyam P, Ko C, Levitt K (2005) “A Specification-Based Intrusion Detection Model for OLSR”. RAID 2005, pp. 330–350.
Perkins CE, Royer EM (2000) The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins editor, Ad hoc Networking, Addison-Wesley, 2000, pp. 173–219.
Khalil I, Bagchi S, Shroff NB (2005) “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.” dsn, 2005 International Conference on Dependable Systems and Networks (DSN’05), pp. 612–621.
Hu YC, Perrig, A, Johnson DB (2003) “Packet leashes: A defense against wormhole attacks in wireless network,.” INFOCOM. (2003).
Capkun S, Buttyan L, Hubaux J (2003) “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. ”ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 1–12 Washington, USA, Oct 2003.
Wang, W, Bhargava, B. Lu, Y. and Wu, X. “Defending against Wormhole Attacks in Mobile Ad Hoc Networks,” preprint, http:/www.cs.purdue.edu/homes/wangwc/papers/MC2R sample101104.pdf
Hu L, Evans D (2004) “Using Directional Antennas to Prevent Wormhole Attacks.” Network and Distributed System Security Symposium (NDSS), San Diego, Feb 2004.
Vassilaras S, Vogiatzis D, Yovanof G (2005) “Misbehavior Detection in Clustered Ad-hoc Networks with Central Control,” itcc, pp. 687–692, International Conference on Information Technology: Coding and Computing (ITCC’05) - Volume II, 2005.
Wang X (2006) “Intrusion Detection Techniques in Wireless Ad Hoc Networks.” compsac, oo. 347–349, 30th Annual International Computer Software and Applications Conference (COMPSAC’06), 2006.
Zhang Y, Liu W, Lou W, Fang Y (2005) Securing sensor networks with location-based keys, WCNC 2005 - IEEE Wireless Communications and Networking Conference, no. 1, March 2005, pp. 1909–1914.
Song N, Qian L, Li X (2005) “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach,” ipdps, p.289a, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS’05) - Workshop 17, 2005.
Buttyan L, Dora L, Vajda I (2005) “Statistical wormhole detection in sensor networks,” Hungary, July 2005.
Wang W, Bhargava B (2004) “Visulization of wormholes in sensor networks,” Proceeding of the ACMWorkshop onWireless Security (WiSe), pages pp. 51–60, 2004.
Azer M, El-Kassas S, El-Soudani M (2006) “Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.,” SECRYPT 2006, pp. 63–68.
Daley K, Larson R, Dawkins J (2002) “A Structural Framework for Modeling Multi-Stage Network Attacks,” icppw, p. 5, 2002 International Conference on Parallel Processing Workshops (ICPPW’02), 2002.
Forde T, Doyle L, O’Mahony D (2006) Ad Hoc Innovation: Distributed Decision Making in Ad Hoc Networks. IEEE Communications Magazine, vol.v 44, no. 4, April 2006.
Aime M, Calandriello G, Lioy A (2006) “A Wireless Distributed Intrusion Detection System and a New Attack Model,” iscc, pp. 35–40, 11th IEEE Symposium on Computers and Communications (ISCC’06), 2006.
Foo B, Wu Y, Mao Y, Bagchi S, Spafford E (2005) “ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment,” dsn, pp. 508–517, 2005 International Conference on Dependable Systems and Networks (DSN’05), 2005.
Watkins D, Scott C, Randle D (2006) “A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets,” pp. 253–260, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’06), 2006.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this chapter
Cite this chapter
Azer, M.A., El-Kassas, S.M., El-Soudani, M.S. (2007). A Scheme for Intrusion Detection and Response in Ad Hoc Networks. In: Labiod, H., Badra, M. (eds) New Technologies, Mobility and Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6270-4_42
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6270-4_42
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6269-8
Online ISBN: 978-1-4020-6270-4
eBook Packages: EngineeringEngineering (R0)