Skip to main content

A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

  • Conference paper
Advances in Parallel Distributed Computing (PDCTA 2011)

Abstract

An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published with in last 3 to 4 years.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaki, R., Chaki, N.: IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. In: Proceedings of the IEEE International Conference on Computer Information Systems and Industrial Management Applications, CISIM (2007)

    Google Scholar 

  2. Chen, T.M., Kuo, G.-S., Li, Z.-P., Zhu, G.-M.: Intrusion Detection in Wireless Mesh Networks. In: Security in Wireless Mesh Networks. CRC Press, Boca Raton (2007)

    Google Scholar 

  3. Sil, P., Chaki, R., Chaki, N.: HIDS: Honesty-rate based collaborative Intrusion Detection System for Mobile Ad-Hoc Networks. In: Proc. of 7th IEEE International Conference on Computer Information Systems and Industrial Management Applications, CISIM (2008)

    Google Scholar 

  4. Sahu, S., Shandilya, S.K.: A Comprehensive Survey on Intrusion Detection in MANET. Int’l J. of Information Technology and Knowledge Mgmt. 2(2), 305–310 (2010)

    Google Scholar 

  5. Martin, A.: A Platform Independent Risk Analysis for Mobile Ad hoc Networks. In: Proc. of the Boston Univ. Conference on Information Assurance and Cyber Security (2006)

    Google Scholar 

  6. Bankovic, Z., et al.: Improving security in WMNs with reputation systems and self-organizing maps. Journal of Network and Computer Applications (2010) ISSN 1084-8045

    Google Scholar 

  7. Mitrokotsa, A., Komninos, N., Douligeris, C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: IEEE International Conference on Pervasive Services, pp. 118–127 (2007)

    Google Scholar 

  8. Mohammed, N., Otrok, H., Wang, L., Debbabi, M., Bhattacharya, P.: Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing 99(1) (2008)

    Google Scholar 

  9. Buchegger, S., Le Boudec, J.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks). In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–336 (2002)

    Google Scholar 

  10. Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE J. on Sel. Areas in Communications 24, 261–273 (2006)

    Article  Google Scholar 

  11. Zaidi, Z.R., Hakami, S., Landfeldt, B., Moors, T.: Detection and identification of anomalies in wireless mesh networks using Principal Component Analysis (PCA). World Scientific Journal of Interconnection Networks, JOIN (2008)

    Google Scholar 

  12. Zhang, Z., Naït-Abdesselam, F., Ho, P.-H., Lin, X.: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. In: IEEE Wireless Communications & Networking Conference, pp. 2621–2626. IEEE, Los Alamitos (2008)

    Google Scholar 

  13. Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Lightweight Intrusion Detection System for Wireless Mesh Networks. In: MobiCom 2009, Beijing, China (September 20-25, 2009)

    Google Scholar 

  14. Shila, D.M., Anjali, T.: Defending Selective Forwarding Attacks in WMNs. In: Proc. of IEEE Int’l. Conference on Electro/Information Technology, USA, pp. 96–101 (2008)

    Google Scholar 

  15. Hamid, A., Islam, S., Hong, C.S.: Misbehavior Detection in Wireless Mesh Networks. In: ICACT 2008, pp. 1167–1169 (2008)

    Google Scholar 

  16. Bansal, S., Baker, M.: Observation-Based Cooperation Enforcement in Ad hoc Networks, Research Report cs.NI/0307012, Stanford University (2003)

    Google Scholar 

  17. Kathirvel, A.: Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. International Journal of Communication Networks and Information Security (IJCNIS) 2(2) (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deb, N., Chakraborty, M., Chaki, N. (2011). A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24037-9_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24036-2

  • Online ISBN: 978-3-642-24037-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics