A Distributed IDS for Ad Hoc Networks

The intrusion detection systems (IDS) are usually designed to work on local networks. However, with the development of mobile networks and their applications, it became necessary to develop new architectures for IDSs to act on these networks in order to detect problems and ensure the correct operation of data communications and its applications. This paper presents a distributed IDS model for mobile ad hoc networks that can identify and punish those network nodes that have malicious behavior. In this paper we describe the proposed model, making a comparison with major efforts in the literature on distributed intrusion detection systems for mobile ad hoc networks.

[1]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.

[2]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[3]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[4]  Luciano Bononi,et al.  Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks , 2007, International Journal of Information Security.

[5]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  Ejaz Ahmed,et al.  Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks , 2006 .

[8]  Rodrigo Rodrigues,et al.  Tolerating Byzantine Faulty Clients in a Quorum System , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[9]  Daniel Sterne,et al.  A dynamic intrusion detection hierarchy for MANETs , 2009, 2009 IEEE Sarnoff Symposium.

[10]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[11]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[12]  Sébastien Tixeuil,et al.  Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks , 2008, SSS.

[13]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[14]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[15]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[16]  Joni da Silva Fraga,et al.  Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.