Collaborative techniques for intrusion detection in mobile ad-hoc networks

被引:43
|
作者
Marchang, Ningrinla [2 ]
Datta, Raja [1 ]
机构
[1] Indian Inst Technol, Dept Elect & Elect Commun Engn, Kharagpur 721302, W Bengal, India
[2] N Eastern Reg Inst Sci & Technol, Dept Comp Sci & Engn, Nirjuli 791109, Arunachal Prade, India
关键词
MANET; Intrusion detection system (IDS); Malicious node; Security; Wireless network;
D O I
10.1016/j.adhoc.2007.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of nodes is known as a clique [12]. The second technique is designed for detection of malicious nodes in a neighborhood of nodes, in which each pair of nodes may not be in radio range of each other but where there is a node among them which has all the other nodes in its one-hop vicinity. This neighborhood is identical to a cluster as mentioned in [12]. Both techniques use message passing between the nodes. A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. Our intrusion detection system is independent of any routing protocol. We give the proof of correctness of the first algorithm, which shows that it correctly detects the malicious nodes always when there is no message loss. We also show with the help of simulations that both the algorithms give good performance even when there are message losses arising due to unreliable channel. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:508 / 523
页数:16
相关论文
共 50 条
  • [1] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [2] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    [J]. SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [3] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [4] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [5] Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
    Vetrichelvi
    Rajaram
    Vanitha
    Mohankumar, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 215 - 219
  • [6] An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
    Ganapathy, S.
    Yogesh, P.
    Kannan, A.
    [J]. ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 117 - 122
  • [7] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639
  • [8] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy, Vasaki
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Yichiet, Aun
    Almufareh, Maram Fahhad
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1199 - 1215
  • [9] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2016, 19 (02): : 782 - 799
  • [10] A Behavioural Theory for Intrusion Detection System in Mobile Ad-hoc Networks
    Yadav, Parul
    Gaur, Manish
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2018), 2018, : 51 - 60