Securing Wireless Ad Hoc Networks: State of the Art and Challenges

The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.

[1]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[2]  Seung Jo Han,et al.  A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.

[3]  Antonio Pescapè,et al.  Challenges in Second-Generation Wireless Mesh Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[4]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[5]  Tammy Esteves,et al.  Reaching Citizen 2.0: How Government Uses Social Media to Send Public Messages during Times of Calm and Times of Crisis , 2012 .

[6]  Raj Sharman,et al.  Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .

[7]  Maria Grazia Fugini,et al.  Information Security Policies and Actions in Modern Integrated Systems , 2004 .

[8]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[9]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[10]  Yu Liu,et al.  A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.

[11]  Saurabh Bagchi,et al.  Multigrade security monitoring for ad-hoc wireless networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[12]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[13]  Ivan Stojmenovic,et al.  Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.

[14]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[15]  Z. Li,et al.  IEEE 802.16: History, status and future trends , 2010, Comput. Commun..

[16]  Bazara I. A. Barry Intrusion detection with OMNeT , 2009, SIMUTools 2009.

[17]  Christos Douligeris,et al.  LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.

[18]  Phillip A. Porras Directions in Network-Based Security Monitoring , 2009, IEEE Security & Privacy Magazine.

[19]  Felix C. Freiling,et al.  Intrusion Detection in Wireless Sensor Networks , 2009 .

[20]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[21]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[22]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[23]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[24]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[25]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[26]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[27]  Joel J. P. C. Rodrigues,et al.  Application of Wireless Sensor Networks to Healthcare Promotion , 2008 .

[28]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[29]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[30]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[31]  Zonghua Zhang,et al.  RADAR: A reputation-driven anomaly detection system for wireless mesh networks , 2010, Wirel. Networks.

[32]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[33]  Sencun Zhu,et al.  Editorial for special issue on privacy and security in wireless sensorand ad hoc networks , 2009, Ad Hoc Networks.

[34]  Timothy W. Finin,et al.  Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[35]  Marco Carvalho Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.

[36]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[37]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[38]  Reihaneh Safavi-Naini,et al.  Securing wireless sensor networks against large-scale node capture attacks , 2010, ASIACCS '10.

[39]  Anupam Joshi,et al.  On Intrusion Detection in Mobile Ad Hoc Networks , 2004 .

[40]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[41]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[42]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[43]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[44]  Saswati Sarkar,et al.  A Statistical Framework for Intrusion Detection in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[45]  A. N. Zincir-Heywood,et al.  Intrusion Detection Systems , 2008 .

[46]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[47]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[48]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[49]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[50]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[51]  Reza Manabi,et al.  Risk Assessment Using AHP in a Petrochemical Engineering Case Study , 2013 .

[52]  Paulo Veríssimo,et al.  Information Assurance Technology Forecast 2008 , 2008, IEEE Security & Privacy Magazine.

[53]  Jing Zhao,et al.  IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[54]  Su Peng,et al.  Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[55]  Sajal K. Das,et al.  Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.

[56]  S. Shankar Sastry,et al.  Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.

[57]  Murray E. Jennex,et al.  Managing Crises and Disasters with Emerging Technologies: Advancements , 2012 .

[58]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[59]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[60]  Farrukh Aslam Khan,et al.  Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.

[61]  Christian Callegari,et al.  New statistical approaches for anomaly detection , 2009, Secur. Commun. Networks.

[62]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[63]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[64]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .