Skip to main content

2016 | OriginalPaper | Buchkapitel

Literature Survey on Intrusion Detection Systems in MANETs

verfasst von : Pooja Kundu, Neeti Kashyap, Neha Yadav

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks are wireless networks consisting of mobile nodes with no boundary. Nodes are free to move and the network is dynamic. Unique features of these networks serve as benefits as well as drawbacks and give chances to attackers. Intrusion occurs when a malicious node tries to enter the network and misuses the resources. Several attacks and intrusion detection techniques are discussed in this paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Anantvalee, Tiranuch, and Jie Wu. “A survey on intrusion detection in mobile ad hoc networks.” Wireless Network Security. Springer US, 2007. 159–180. Anantvalee, Tiranuch, and Jie Wu. “A survey on intrusion detection in mobile ad hoc networks.” Wireless Network Security. Springer US, 2007. 159–180.
2.
Zurück zum Zitat L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
3.
Zurück zum Zitat Zhang, Yongguang, Wenke Lee, and Yi-An Huang. “Intrusion detection techniques for mobile wireless networks.” Wireless Networks 9.5 (2003): 545–556. Zhang, Yongguang, Wenke Lee, and Yi-An Huang. “Intrusion detection techniques for mobile wireless networks.” Wireless Networks 9.5 (2003): 545–556.
4.
Zurück zum Zitat S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, in Proc. 6th ACM International Conference on Mobile Computing and Networking,, Boston, USA, August 2000, pp. 255–265. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, in Proc. 6th ACM International Conference on Mobile Computing and Networking,, Boston, USA, August 2000, pp. 255–265.
5.
Zurück zum Zitat Nasser, Nidal, and Yunfeng Chen. “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks.” Communications, 2007. ICC’07. IEEE International Conference on. IEEE, 2007. Nasser, Nidal, and Yunfeng Chen. “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks.” Communications, 2007. ICC’07. IEEE International Conference on. IEEE, 2007.
6.
Zurück zum Zitat K. Balakrishnan, J. Deng, and P.K. Varshney, -TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,ǁ Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005. K. Balakrishnan, J. Deng, and P.K. Varshney, -TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,ǁ Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.
7.
Zurück zum Zitat Al-Roubaiey, Anas, et al. “AACK: adaptive acknowledgment intrusion detection for MANET with node detection enhancement.” Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, 2010. Al-Roubaiey, Anas, et al. “AACK: adaptive acknowledgment intrusion detection for MANET with node detection enhancement.” Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, 2010.
8.
Zurück zum Zitat Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. “EAACK—a secure intrusion-detection system for MANETs.” Industrial Electronics, IEEE Transactions on 60.3 (2013): 1089–1098. Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. “EAACK—a secure intrusion-detection system for MANETs.” Industrial Electronics, IEEE Transactions on 60.3 (2013): 1089–1098.
9.
Zurück zum Zitat Chang, Katharine, and Kang G. Shin. “Application-Layer Intrusion Detection in MANETs.” System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010. Chang, Katharine, and Kang G. Shin. “Application-Layer Intrusion Detection in MANETs.” System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010.
10.
Zurück zum Zitat Mohammed, Noman, et al. “Mechanism design-based secure leader election model for intrusion detection in MANET.” Dependable and Secure Computing, IEEE Transactions on 8.1 (2011): 89–103. Mohammed, Noman, et al. “Mechanism design-based secure leader election model for intrusion detection in MANET.” Dependable and Secure Computing, IEEE Transactions on 8.1 (2011): 89–103.
11.
Zurück zum Zitat Li, Huike, and Daquan Gu. “A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks.” Web Mining and Web-based Application, 2009. WMWA’09. Second Pacific-Asia Conference on. IEEE, 2009. Li, Huike, and Daquan Gu. “A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks.” Web Mining and Web-based Application, 2009. WMWA’09. Second Pacific-Asia Conference on. IEEE, 2009.
12.
Zurück zum Zitat Liu, Jie, et al. “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.” Wireless Communications, IEEE Transactions on 8.2 (2009): 806–815. Liu, Jie, et al. “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.” Wireless Communications, IEEE Transactions on 8.2 (2009): 806–815.
13.
Zurück zum Zitat Sun, B., Wu, K., and Pooch, U.W., (2006). Zone-Based Intrusion Detection for Mobile Ad Hoc Networks, International Journal of Ad Hoc & Sensor Wireless Networks, 3, 2. Sun, B., Wu, K., and Pooch, U.W., (2006). Zone-Based Intrusion Detection for Mobile Ad Hoc Networks, International Journal of Ad Hoc & Sensor Wireless Networks, 3, 2.
14.
Zurück zum Zitat Şen, Sevil, John A. Clark, and Juan E. Tapiador. “Power-aware intrusion detection in mobile ad hoc networks.” Ad hoc networks. Springer Berlin Heidelberg, 2010. 224–239. Şen, Sevil, John A. Clark, and Juan E. Tapiador. “Power-aware intrusion detection in mobile ad hoc networks.” Ad hoc networks. Springer Berlin Heidelberg, 2010. 224–239.
15.
Zurück zum Zitat Abbas, Sonya, et al. “Lightweight Sybil attack detection in MANETs.” Systems Journal, IEEE 7.2 (2013): 236–248. Abbas, Sonya, et al. “Lightweight Sybil attack detection in MANETs.” Systems Journal, IEEE 7.2 (2013): 236–248.
16.
Zurück zum Zitat Xiaopeng, Gao, and Chen Wei. “A novel gray hole attack detection scheme for mobile ad-hoc networks.” Network and Parallel Computing Workshops, 2007. NPC workshops. IFIP International Conference on. IEEE, 2007. Xiaopeng, Gao, and Chen Wei. “A novel gray hole attack detection scheme for mobile ad-hoc networks.” Network and Parallel Computing Workshops, 2007. NPC workshops. IFIP International Conference on. IEEE, 2007.
Metadaten
Titel
Literature Survey on Intrusion Detection Systems in MANETs
verfasst von
Pooja Kundu
Neeti Kashyap
Neha Yadav
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2755-7_38

Premium Partner