Intrusion detection: Ad-hoc networks to ambient intelligence framework

The main advantage of the wireless ad hoc network lies in its ability to perform on a decentralized basis, without any base station. However, the absence of centralized control makes it vulnerable to various threats from insiders such as unauthorized attempt to access and/or manipulate information. An attacker has the ability to listen to all network traffic, and even make changes causing serious damages to confidentiality. In the context of ambient inteligent systems, detection of intrusion is even more important. There are numerous sensors, communicating among themselves in an unambiguous manner. Attacks such as sleep deprivation, eavesdropping, etc have become all the more dangerous for heavy dependence on ad-hoc wireless communications. The timeliness of data delivery is of utmost importance in systems like healthcare. Intrusion of any kind may lead to a chaotic condition. The focus of research is now on developing full-proof IDS for the AmI systems. In this article, a study on the transformation of IDS from the primitive wireless ad hoc network to the ambient intteligent scenario has been presented.

[1]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[3]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.

[4]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[5]  Rituparna Chaki,et al.  HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[6]  Rituparna Chaki,et al.  IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).

[7]  Mircea Vladutiu,et al.  Redundancy at Link Level for Non-Traditional Grids Implemented with Intelligent Agents , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[8]  Yi Qian,et al.  Performance Study of a Secure Routing Protocol in Wireless Mobile Ad Hoc Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[9]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[10]  Rituparna Chaki,et al.  BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.

[11]  Wei Yu,et al.  Securing Wireless Ad Hoc Networks under noise and Imperfect Monitoring , 2006 .

[12]  Dong Hwa Kim,et al.  2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010 , 2010, CISIM.

[13]  Boris E. R. de Ruyter,et al.  New research perspectives on Ambient Intelligence , 2009, J. Ambient Intell. Smart Environ..

[14]  Amitabh Mishra,et al.  Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).

[15]  Fumio Harashima,et al.  IEEE International Conference on Systems, Man, and Cybernetics , 2000 .

[16]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[17]  Anirban Chakrabarti Grid computing security , 2007 .

[18]  M.R. Lyu,et al.  An authentication service against dishonest users in mobile ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[19]  Chunxiao Chigan,et al.  Secure node misbehaviors in mobile ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[20]  Constantine N. Manikopoulos,et al.  Architecture of the mobile ad-hoc network security (MANS) system , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[21]  Chadi Assi,et al.  Cross-Layer Cooperation to Handle MAC Misbehavior in Ad Hoc Networks , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[22]  Minghua Zhao,et al.  An Efficient and Secure Group Key Agreement Using in the Group Communication of Mobile Ad-hoc Networks , 2006, 2006 International Conference on Computational Intelligence and Security.

[23]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[24]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[25]  Albert Ali Salah,et al.  Sensor Networks for Ambient Intelligence , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.

[26]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[27]  Dharma P. Agrawal,et al.  Totally distributed key management for dynamic groups in MANETs , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[28]  Carsten Rudolph,et al.  Security Engineering for Ambient Intelligence: A Manifesto , 2006 .

[29]  P. Briggs,et al.  Using Ubicomp systems for exchanging health information : considering trust and privacy issues , 2006 .

[30]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[31]  Alagan Anpalagan,et al.  IEEE Canadian Conference on Electrical and Computer Engineering 2008 , 2008 .