Threshold-based intrusion detection in ad hoc networks and secure AODV

被引:15
|
作者
Patwardhan, A. [1 ]
Parker, J. [1 ]
Iorga, M. [2 ]
Joshi, A. [1 ]
Karygiannis, T. [2 ]
Yesha, Y. [1 ]
机构
[1] UM BC, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] Natl Inst Stand & Technol, Comp Secur Div, Gaithersburg, MD 20899 USA
基金
美国国家科学基金会;
关键词
MANETs; Secure routing; Intrusion detection; SecAODV;
D O I
10.1016/j.adhoc.2007.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) play an important role in connecting devices in pervasive environments. MANETs provide inexpensive and versatile communication, yet several challenges remain in addressing their security. So far, numerous schemes have been proposed for secure routing and intrusion detection, with only simulations to validate them; little work exists, in implementing such schemes on small handheld devices. In this paper, we present our approach of securing a MANET using a threshold-based intrusion detection system and a secure routing protocol. We present a proof-of-concept implementation of our IDS deployed on handheld devices and in a MANET testbed connected by a secure version of AODV over IPv6 - SecAODV. While the IDS helps detect attacks on data traffic, SecAODV incorporates security features of non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:578 / 599
页数:22
相关论文
共 50 条
  • [1] Secure routing and intrusion detection in ad hoc networks
    Patwardhan, A
    Parker, J
    Joshi, A
    Iorga, M
    Karygiannis, T
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 191 - 199
  • [2] A secure routing mechanism in AODV for ad hoc networks
    Liu Jinghua
    Peng, Geng
    Qiu Yingqiang
    Gui, Feng
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 446 - +
  • [3] Secure routing in ad hoc networks and a related intrusion detection problem
    Zhang, WS
    Rao, R
    Cao, GH
    Kesidis, G
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 735 - 740
  • [4] A Dynamic Threshold-based Probabilistic Scheme for Broadcasting in Ad hoc Networks
    Chekhar, M.
    Zine-Dine, K.
    Bakhouya, M.
    Aaroud, A.
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 511 - 516
  • [5] A wireless intrusion detection system for secure clustering and routing in ad hoc networks
    Bononi, Luciano
    Tacconi, Carlo
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 398 - 414
  • [6] Threshold-based key predistribution in Ad hoc network
    Zhang, Xue-Feng
    Liu, Bin
    Jiang, Huang-Pu
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (06): : 1160 - 1163
  • [7] An intrusion detection method based on DBN in ad hoc networks
    Tan, Qiu-shi
    Huang, Wei
    Li, Qiang
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 477 - 485
  • [8] An Analysis of Monitoring Based Intrusion Detection for Ad Hoc Networks
    Boppana, Rajendra V.
    Su, Xu
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [9] Intrusion detection based timed automata for Ad hoc networks
    Yi, Ping
    Liu, Ning
    Wu, Yue
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (10): : 2310 - 2315
  • [10] Threshold-based clustering for intrusion detection systems
    Nikulin, Vladimir
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241