EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 3

Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques

journal image
 Download
1868
  • Monika Darji and Bhushan Trivedi 2012. Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques. International Journal of Applied Information Systems. 1, 3 (February 2012), 38-43. DOI=http://dx.doi.org/10.5120/ijais450153
  • @article{10.5120/ijais2017451568,
    author = {Monika Darji and Bhushan Trivedi},
    title = {Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques},
    journal = {International Journal of Applied Information Systems},
    issue_date = {February 2012},
    volume = {1},
    number = {},
    month = {February},
    year = {2012},
    issn = {},
    pages = {38-43},
    numpages = {},
    url = {/archives/volume1/number3/77-0153},
    doi = { 10.5120/ijais12-450153},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450153
    %A Monika Darji
    %A Bhushan Trivedi
    %T Survey of Intrusion Detection and Prevention System in MANETs based on Data Gathering Techniques
    %J International Journal of Applied Information Systems
    %@ 
    %V 1
    %N 
    %P 38-43
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. Here we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend routing against denial of service attacks. We use replication and new cryptographic schemes, such as HSHA Key cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. It helps the network to let the intruder cannot access the packet without the proper authentication. Unauthorized user cannot access the packet. There are various consequences of this algorithm.

References

  1. C.S.R.Murthy and B.S.Manoj, Ad Hoc Wireless Networks, Pearson Education, 2008.
  2. George Aggelou, Mobile Ad Hoc Networks, McGraw-Hill, 2004.
  3. E. Ahmed, K. Samad, W. Mahmood, “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks,” AusCERT2006 R&D Stream Program, Information Technology Security Conference, May 2006.
  4. Zhou Chunyue, L.Y., (2006) “A Pattern Matching Based Network Intrusion Detection System”, IEEE, 9th International Conference on Control, Automation, Robotics and Vision 2006, 5-8 Dec, ICARCV '06, Singapore.
  5. Lu Huijuan, Chen Jianguo and Wei Wei, (2008) “Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System”, International Symposium on Electronic Commerce and Security, pp.482-487.
  6. Y. Zhang, W. Lee, ”Intrusion Detection in wireless ad -hoc networks”, Proc. of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’2000), pp. 275-283, Aug 6-11.
  7. S. Buchegger, J.L. Boudec, “Performance analysis of the CONFIDANT protocol: cooperation of nodes- fairness in dynamic ad-hoc networks,” Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June 2002, pp. 226-236.
  8. O. Kachirski, R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks”, Proc. of the 36th Hawaii International Conference on System Sciences (HICSS’03), IEEE, 2002.
  9. P. Albers, O. Camp, J-M. Percher, B. Jouga, M. Ludovic, and R.Puttini, “Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches”, Proc. of the First International Workshop on Wireless Information Systems (WIS-2002), April 2002, pp.1-12.
  10. D.Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R.Talpade,C.Ko, R. Balupari, C-Y. Tseng, T. Bowen, K. Levitt, J. Rowe, “A General Cooperative Intrusion Detection Architecture for MANETs”, In Proc. of the 3rd IEEE International Workshop on Information Assurance, pp. 57-70, 2005.
  11. B. Sun, K. Wu, U.W. Pooch. “Zone-based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc and Sensor Wireless Networks”, zVol 2, No. 3, 2006.
  12. R. Nakkeeran, T. Aruldoss Albert and R.Ezumalai,”Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks”,IACSIT International Journal of Engineering and Technology Vol. 2, No.1, February,2010.
  13. Jaydip Sen, “An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks”, Second International Conference on Computational Intelligence, Communication Systems and Networks, 2010.
  14. Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, IEEE Transactions on Dependable and Secure Computing, vol. 99, no. 1, 2008.
  15. Yinan Li , Zhihong Qian,” Mobile agents-based intrusion detection system for mobile ad hoc networks” 2010 International Conference on Innovative Computing and Communication and 2010 Asia-Pacific Conference on Information Technology and Ocean Engineering
  16. S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom, pp. 255-265, Aug. 2000.

Keywords

Intrusion Detection and Prevention System, MANET, Data gathering techniques

Index Terms

Computer Science
Information Sciences