Skip to main content
Log in

Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks

  • Special Issue Paper
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Intrusion detection and secure routing schemes have been proposed for increasing security and reliability in critical wireless scenarios. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and Statistically Unique and Cryptographically Verifiable (SUCV) identifiers. The proposed IDS has been used for the support of secure Ad Hoc On Demand Distance Vector (AODV) routing, named IDS-based Secure AODV (IS-AODV), in wireless ad hoc and vehicular network scenarios. Our IDS is based on the detection of behavior anomalies on behalf of neighbor hosts, with passive reactions, aiming to create a cluster whose route paths will include only safe nodes, eventually. Simulation results show that the proposed IDS is effective in isolating misbehaving hosts, and it assists the AODV secure routing scheme to converge in finding safe end-to-end routes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Albers, P., Camp, O., Parcher, J.M., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a general intrusion detection architecture enhancing trust based approaches. In: WIS 2002. 4th International Conference on Enterprise Information Systems

  2. Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In: Proceedings of vehicular technology conference (2001)

  3. Bobba, R.B., Eschenauer, L., Gligor, V.D., Arbaugh, W.: Bootstrapping security associations for routing in Mobile Ad-Hoc Networks. In: Proceedings of IEEE global telecommunications conference, December 2003

  4. Bononi, L., Tacconi, C.: A wireless intrusion detection system for secure clustering and routing in Wireless Ad Hoc Networks. In: LNCS 4176–2006, Proceedings of the 9th International information security conference (ISC 2006), 08/2006, Samos, Greece, pp. 398–414

  5. Buchegger, S., Le Boudec J-Y.: Performance analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). MobiHoc 2002

  6. Castelluccia, C., Montenegro, G.: Protecting AODV against Impersonation Attack. ACM Mobile Comput. Commun. Rev. 6(3), (2002)

  7. Clausen, T., Jaquet, P., Laouti, A., Minet, P., Muhlethaler, P., Quyyum A., Viennot, L.: Optimized link state routing protocol. Internet Draft, draft-ietf-manet-olsr-06.txt, work in progress, Sep 2001

  8. Dahill, B., Levine, B.N., Royer, E.M., Shields, C.: A secure routing protocol for Ad hoc Networks. Technical Report UM-CS-2001-037, University of Massachusetts, Aug 2001

  9. Deng, H., Li, W., Agrawal, D.P.: Routing security in Wireless Ad Hoc Networks. IEEE Communications, October 2002

  10. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for Ad hoc Networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking (MobiCom 02), September 2002, pp. 12–23

  11. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for Wireless Ad hoc Networks. In: Proceedings of the 4th IEEE Workshop on mobile Computing Systems and Applications (WMCSA 02), June 2002, pp. 3–13

  12. Huang Y-A., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting Ad-Hoc Routing Anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), 2003

  13. Huang Y-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. in Procs. of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003, pp. 135–147

  14. Johnson, D.B., Maltz, D.A., Hu Y-C, Jetcheva, J.G.: The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR). Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, Feb 2002

  15. Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against Mobile Ad-Hoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60–67

  16. Marti, S., Giuli, T.J., Lai, K., Mitigating, B.M.: Routing misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th Annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 255–265 (2000)

  17. Michiardi, P., Molva, R. Core: a COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proocedings of IFIP Communication and Multimedia Security Conference 2002

  18. Montenegro G. and Castelluccia C. (2004). Crypto-Based Identifiers (CBIDs): concept and applications. ACM Trans. Informat. Syst. Security 7(1): 97–127

    Article  Google Scholar 

  19. Papadimitratos, P., Haas, Z.J.: Secure routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems, Modelling and Simulation Conference (CNDS 02), January 2002, pp. 27–31

  20. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in Mobile Ad Hoc Networks. In Proceedings of the Radio and Wireless Conference, RAWCON 2003

  21. Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in Ad Hoc Networks. In: Proceedings of PerCom 2005

  22. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, August 1994

  23. Perkins, C.E., Belding-Royer, E.: Ad hoc On-demand Distance Vector (AODV), Request For Comments (RFC) 3561, July 2003

  24. Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134, (2003)

  25. Undercoffer, J., Joshi, A.: Neighborhood watch: an intrusion detection and response protocol for Mobile Ad-hoc Networks. Technical Report UMBC, October 2002

  26. Uppsala University AODV implementation. http://www.docs.uu. se/docs/research/projects/scanet/aodv/aodvuu.shtml

  27. Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion detection techniques for Mobile Wireless Networks. Wireless Networks 9(5), September 2003

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luciano Bononi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bononi, L., Tacconi, C. Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Int. J. Inf. Secur. 6, 379–392 (2007). https://doi.org/10.1007/s10207-007-0035-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-007-0035-9

Keywords

Navigation