Threshold-based intrusion detection in ad hoc networks and secure AODV

被引:15
|
作者
Patwardhan, A. [1 ]
Parker, J. [1 ]
Iorga, M. [2 ]
Joshi, A. [1 ]
Karygiannis, T. [2 ]
Yesha, Y. [1 ]
机构
[1] UM BC, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] Natl Inst Stand & Technol, Comp Secur Div, Gaithersburg, MD 20899 USA
基金
美国国家科学基金会;
关键词
MANETs; Secure routing; Intrusion detection; SecAODV;
D O I
10.1016/j.adhoc.2007.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) play an important role in connecting devices in pervasive environments. MANETs provide inexpensive and versatile communication, yet several challenges remain in addressing their security. So far, numerous schemes have been proposed for secure routing and intrusion detection, with only simulations to validate them; little work exists, in implementing such schemes on small handheld devices. In this paper, we present our approach of securing a MANET using a threshold-based intrusion detection system and a secure routing protocol. We present a proof-of-concept implementation of our IDS deployed on handheld devices and in a MANET testbed connected by a secure version of AODV over IPv6 - SecAODV. While the IDS helps detect attacks on data traffic, SecAODV incorporates security features of non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:578 / 599
页数:22
相关论文
共 50 条
  • [21] An intrusion detection system for suburban ad hoc networks
    Islam, Muhammad Mahmudul
    Pose, Ronald
    Kopp, Carlo
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 47 - +
  • [22] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [23] An architecture for resilient intrusion detection in ad -hoc networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [24] Intrusion detection techniques in wireless ad hoc networks
    Wang, Xia
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 347 - 349
  • [25] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [26] Hybrid Intrusion Detection Framework for Ad hoc networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghanemi, Salim
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (04) : 1 - 32
  • [27] A scheme for intrusion detection and response in ad hoc networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 507 - +
  • [28] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [29] RIDA: Robust intrusion detection in ad hoc networks
    Subhadrabandhu, D
    Sarkar, S
    Anjum, F
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 1069 - 1082
  • [30] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859