Abstract
An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published with in last 3 to 4 years.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chaki, R., Chaki, N.: IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. In: Proceedings of the IEEE International Conference on Computer Information Systems and Industrial Management Applications, CISIM (2007)
Chen, T.M., Kuo, G.-S., Li, Z.-P., Zhu, G.-M.: Intrusion Detection in Wireless Mesh Networks. In: Security in Wireless Mesh Networks. CRC Press, Boca Raton (2007)
Sil, P., Chaki, R., Chaki, N.: HIDS: Honesty-rate based collaborative Intrusion Detection System for Mobile Ad-Hoc Networks. In: Proc. of 7th IEEE International Conference on Computer Information Systems and Industrial Management Applications, CISIM (2008)
Sahu, S., Shandilya, S.K.: A Comprehensive Survey on Intrusion Detection in MANET. Int’l J. of Information Technology and Knowledge Mgmt. 2(2), 305–310 (2010)
Martin, A.: A Platform Independent Risk Analysis for Mobile Ad hoc Networks. In: Proc. of the Boston Univ. Conference on Information Assurance and Cyber Security (2006)
Bankovic, Z., et al.: Improving security in WMNs with reputation systems and self-organizing maps. Journal of Network and Computer Applications (2010) ISSN 1084-8045
Mitrokotsa, A., Komninos, N., Douligeris, C.: Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. In: IEEE International Conference on Pervasive Services, pp. 118–127 (2007)
Mohammed, N., Otrok, H., Wang, L., Debbabi, M., Bhattacharya, P.: Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing 99(1) (2008)
Buchegger, S., Le Boudec, J.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks). In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), pp. 226–336 (2002)
Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE J. on Sel. Areas in Communications 24, 261–273 (2006)
Zaidi, Z.R., Hakami, S., Landfeldt, B., Moors, T.: Detection and identification of anomalies in wireless mesh networks using Principal Component Analysis (PCA). World Scientific Journal of Interconnection Networks, JOIN (2008)
Zhang, Z., Naït-Abdesselam, F., Ho, P.-H., Lin, X.: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. In: IEEE Wireless Communications & Networking Conference, pp. 2621–2626. IEEE, Los Alamitos (2008)
Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Lightweight Intrusion Detection System for Wireless Mesh Networks. In: MobiCom 2009, Beijing, China (September 20-25, 2009)
Shila, D.M., Anjali, T.: Defending Selective Forwarding Attacks in WMNs. In: Proc. of IEEE Int’l. Conference on Electro/Information Technology, USA, pp. 96–101 (2008)
Hamid, A., Islam, S., Hong, C.S.: Misbehavior Detection in Wireless Mesh Networks. In: ICACT 2008, pp. 1167–1169 (2008)
Bansal, S., Baker, M.: Observation-Based Cooperation Enforcement in Ad hoc Networks, Research Report cs.NI/0307012, Stanford University (2003)
Kathirvel, A.: Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. International Journal of Communication Networks and Information Security (IJCNIS)Â 2(2) (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deb, N., Chakraborty, M., Chaki, N. (2011). A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-24037-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24036-2
Online ISBN: 978-3-642-24037-9
eBook Packages: Computer ScienceComputer Science (R0)