Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
نویسندگان
چکیده
IntroductIon Wireless ad hoc networks have attracted extensive attention among researchers in recent years. As the research activities matured, it has been widely realized that security in such networks is a major issue, and an extremely challenging one. The challenge arises mainly from the inherent AbstrAct Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized nodes, the lack of infrastructure, and so forth. Furthermore, in addition to application-based attacks, ad hoc networks are prone to attacks targeting routing protocols. Issues in intrusion detection in ad hoc networks are addressed by numerous research proposals in literature. In this chapter, we first enumerate the properties of ad hoc networks which hinder intrusion detection systems. After that, significant intrusion detection system (IDS) architectures and methodolo-gies proposed in the literature are elucidated. Strengths and weaknesses of these works are studied and are explained. Finally, the future directions which will lead to the successful deployment of intrusion detection in ad hoc networks are discussed. characteristics of ad hoc networks. Chief among the characteristics, which affect the design of an effective security framework for such networks, are the highly distributed, decentralized, and dynamic natures of ad hoc networks. These properties , coupled with the lack of infrastructure in ad hoc networks, introduce some unprecedented issues, which are absent and never been explored in conventional networks. A typical security system consists of two major components. The first is the intrusion prevention mechanism that aims to control access to the system and relies mainly on cryptographic techniques. The second one is the intrusion detection system that tries to detect if the prevention mechanism has been compromised by intruders, and if so, come up with an appropriate response to combat such intrusions. The intrusion detection system (IDS) thus forms the second line of defense (Nadkarni & Mishra, 2003). Cryptographic techniques rely on secure key management and key distribution which require supporting infrastructure. The lack of infrastructure makes it extremely difficult to implement cryptographic access control mechanisms in ad hoc networks. This makes intrusion detection all the more important for such networks. However, it turns out that the inherent characteristics of ad hoc networks render conventional IDS unsuitable for such networks. This has spawned the research in ad hoc IDS design (Brutch & Ko, 2003). This chapter illustrates the difficulties in providing an efficient intrusion detection …
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کامل