A cooperative intrusion detection scheme for clustered mobile ad hoc networks

A mobile ad hoc network is a collection of wireless mobile devices communicating with each other and forming a temporary network, without any pre-deployed infrastructure. Security in MANET is a main and important element for the basic functions of a network. One of the security technologies is intrusion detection system which provides a second line of defense. In this paper, we propose an efficient defense system based on a cooperative scheme to deal with intrusions in clustered ad hoc networks. Our proposed system provides security against all network attacks that can be detected by any node in the network, in particular detects the actor. It is simple, reliable, effective and its performance not affected by status of channel.

[1]  Anupam Joshi,et al.  On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[2]  Luciano Bononi,et al.  A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks , 2006, ISC.

[3]  Bharat Bhargava,et al.  Defending against Collaborative Packet Drop Attacks on MANETs , 2009 .

[4]  C Rajabhushanam,et al.  Survey of Wireless MANET Application in Battlefield Operations , 2011 .

[5]  Rong Wang,et al.  A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks , 2008, KES-AMSTA.

[6]  Zhe Li,et al.  The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Ming-Yang Su,et al.  Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes , 2010, WASA.

[8]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[9]  Aditya Goel,et al.  Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol , 2009 .

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  H. T. Mouftah,et al.  AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[12]  Rui Chen,et al.  An Intrusion Detection Method for Ad Hoc Network Based on Class Association Rules Mining , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.

[13]  Hecht-Nielsen Theory of the backpropagation neural network , 1989 .

[14]  Dharma P. Agrawal,et al.  Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[15]  S. Shanmugavel,et al.  Providing Routing Security Using ROS Protocol in MANET and Performance Comparison with AODV , 2007 .

[16]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[17]  Min-Hua Shao,et al.  Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[18]  Yu Yao,et al.  Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Information Technology and Computer Science.

[19]  Tai Hoon Kim AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS , 2008 .

[20]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[21]  Arputharaj Kannan,et al.  An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques , 2011 .

[22]  R. Hecht-Nielsen,et al.  Theory of the Back Propagation Neural Network , 1989 .

[23]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[24]  Hao Sun,et al.  Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks , 2010, Int. J. Commun. Netw. Syst. Sci..