EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 10

IDSs based on Stand-alone Architecture for MANET: A Survey

journal image
 Download
1275
  • Kapil Dhamecha and Rutvik Upadhyay and Bhushan Trivedi 2012. IDSs based on Stand-alone Architecture for MANET: A Survey. International Journal of Applied Information Systems. 4, 10 (December 2012), 13-19. DOI=http://dx.doi.org/10.5120/ijais450792
  • @article{10.5120/ijais2017451568,
    author = {Kapil Dhamecha and Rutvik Upadhyay and Bhushan Trivedi},
    title = {IDSs based on Stand-alone Architecture for MANET: A Survey},
    journal = {International Journal of Applied Information Systems},
    issue_date = {December 2012},
    volume = {4},
    number = {},
    month = {December},
    year = {2012},
    issn = {},
    pages = {13-19},
    numpages = {},
    url = {/archives/volume4/number10/393-0792},
    doi = { 10.5120/ijais12-450792},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450792
    %A Kapil Dhamecha
    %A Rutvik Upadhyay
    %A Bhushan Trivedi
    %T IDSs based on Stand-alone Architecture for MANET: A Survey
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 13-19
    %D 2012
    %I  xA9 2012 by IJAIS Journal
    

Abstract

Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDSs for MANETs have attracted much attention recently and thus, there are many publications that propose new IDS solutions or improvements to the existing. Current IDSs pose challenges on not only capricious intrusion categories, but also huge computational power. Though there are a number of existing literatures to IDS issues, an attempt is made to give a more elaborate image for a comprehensive review on IDSs based on stand-alone architecture for MANETs, because of the uniqueness to identify the attack solely. In addition, the table and the figure summarized in the content contribute to easily grasp the overall picture of stand-alone IDSs along with existing open issues.

References

  1. H. Miranda and L. Rodrigues, 'Preventing selfishness in open mobile ad hoc networks,' in Proc. Of the Seventh CaberNet Radicals Workshop, October 2002.
  2. D. Djenouri, L. Khelladi, N. Badache, "A Survey of Security Issues in Mobile Ad Hoc Networks," IEEE Communications Surveys, Vol. 7, No. 4, Fourth Quarter 2005.
  3. S. Sen and J. A. Clark, "Intrusion Detection in Mobile Ad Hoc Networks". In: Guide to Wireless Ad Hoc Networks, S. Misra, I. Woungang, S. C. Misra (Eds. ), Springer, 2009.
  4. T. Anantvalee, J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, Chapter 7, pp. 170 - 196, 2006.
  5. C. Xenakis, C. Panos, I. Stavrakaki,"A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks" Computers and Security , Elsevier, pp. 63-80,2011.
  6. Y. Jain, R. Ahirwar,"Secure Mobile Agent Based IDS for MANET", International Journal of Computer Science and Information Technologies, Vol. 3 (4), pp. 4798-4805, 2012.
  7. G. A. Jacoby, N. J. Davis, "Mobile Host-Based intrusion Detection and Attack Identification, "IEEE Wireless Communications, vol. 14, issue 4, pp. 53-60, August 2007.
  8. K. Nadkarni, A. Mishra, "A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks," IEEE Wireless Communications and Networking Conference (WCNC. 2004), Vol. 2, pp. 831 – 836, March 2004.
  9. A. Lauf, R. A. Peters, W. H. Robinson, "A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks". Elsevier Journal of Ad Hoc Networks, vol. 8, issue 3, pp. 253-266, May 2010.
  10. S. Gavini," Detecting Packet dropping faults in Mobile Adhoc Networks", 2004.
  11. P. Kabiri, M. Again, "Feature Analysis for Intrusion Detection in Mobile Ad Hoc Networks",International Journal of Network Security, 12 (2), 80-87, 2011.
  12. J. Joseph, B. Lee, A. Das, & B. Seet, "Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA", Dependable and Secure Computing, IEEE Transactions, 8 (2), 233-245,2011.
  13. H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, & N. Kato," A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks", Vehicular Technology, IEEE Transactions on, 58(5), 2471-2481, 2009.
  14. S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks," Research Report cs. NI/0307012, Stanford University, 2003.
  15. S. Srivastava, N. Gupta, S. Chturvedi, S. Ghosh, "A Survey on Mobile Agent based Intrusion Detection System", ISDMISC, IJCA, 2011.
  16. D Kheyri1 & M Karami1,"A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET", Computer and Information Science; Vol. 5, No. 4; 2012.
  17. Y Huang, & L Wenke," A Cooperative Intrusion Detection System for Ad Hoc Networks", proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks2003.

Keywords

Mobile Adhoc Network (MANET), Intrusion Detection System (IDS), stand-alone architecture

Index Terms

Computer Science
Information Sciences