Abstract
Intrusion detection and secure routing schemes have been proposed for increasing security and reliability in critical wireless scenarios. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and Statistically Unique and Cryptographically Verifiable (SUCV) identifiers. The proposed IDS has been used for the support of secure Ad Hoc On Demand Distance Vector (AODV) routing, named IDS-based Secure AODV (IS-AODV), in wireless ad hoc and vehicular network scenarios. Our IDS is based on the detection of behavior anomalies on behalf of neighbor hosts, with passive reactions, aiming to create a cluster whose route paths will include only safe nodes, eventually. Simulation results show that the proposed IDS is effective in isolating misbehaving hosts, and it assists the AODV secure routing scheme to converge in finding safe end-to-end routes.
Similar content being viewed by others
References
Albers, P., Camp, O., Parcher, J.M., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a general intrusion detection architecture enhancing trust based approaches. In: WIS 2002. 4th International Conference on Enterprise Information Systems
Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In: Proceedings of vehicular technology conference (2001)
Bobba, R.B., Eschenauer, L., Gligor, V.D., Arbaugh, W.: Bootstrapping security associations for routing in Mobile Ad-Hoc Networks. In: Proceedings of IEEE global telecommunications conference, December 2003
Bononi, L., Tacconi, C.: A wireless intrusion detection system for secure clustering and routing in Wireless Ad Hoc Networks. In: LNCS 4176–2006, Proceedings of the 9th International information security conference (ISC 2006), 08/2006, Samos, Greece, pp. 398–414
Buchegger, S., Le Boudec J-Y.: Performance analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). MobiHoc 2002
Castelluccia, C., Montenegro, G.: Protecting AODV against Impersonation Attack. ACM Mobile Comput. Commun. Rev. 6(3), (2002)
Clausen, T., Jaquet, P., Laouti, A., Minet, P., Muhlethaler, P., Quyyum A., Viennot, L.: Optimized link state routing protocol. Internet Draft, draft-ietf-manet-olsr-06.txt, work in progress, Sep 2001
Dahill, B., Levine, B.N., Royer, E.M., Shields, C.: A secure routing protocol for Ad hoc Networks. Technical Report UM-CS-2001-037, University of Massachusetts, Aug 2001
Deng, H., Li, W., Agrawal, D.P.: Routing security in Wireless Ad Hoc Networks. IEEE Communications, October 2002
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for Ad hoc Networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking (MobiCom 02), September 2002, pp. 12–23
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for Wireless Ad hoc Networks. In: Proceedings of the 4th IEEE Workshop on mobile Computing Systems and Applications (WMCSA 02), June 2002, pp. 3–13
Huang Y-A., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting Ad-Hoc Routing Anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), 2003
Huang Y-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. in Procs. of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003, pp. 135–147
Johnson, D.B., Maltz, D.A., Hu Y-C, Jetcheva, J.G.: The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR). Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress, Feb 2002
Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against Mobile Ad-Hoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60–67
Marti, S., Giuli, T.J., Lai, K., Mitigating, B.M.: Routing misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th Annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Michiardi, P., Molva, R. Core: a COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proocedings of IFIP Communication and Multimedia Security Conference 2002
Montenegro G. and Castelluccia C. (2004). Crypto-Based Identifiers (CBIDs): concept and applications. ACM Trans. Informat. Syst. Security 7(1): 97–127
Papadimitratos, P., Haas, Z.J.: Secure routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems, Modelling and Simulation Conference (CNDS 02), January 2002, pp. 27–31
Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in Mobile Ad Hoc Networks. In Proceedings of the Radio and Wireless Conference, RAWCON 2003
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure routing and intrusion detection in Ad Hoc Networks. In: Proceedings of PerCom 2005
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, August 1994
Perkins, C.E., Belding-Royer, E.: Ad hoc On-demand Distance Vector (AODV), Request For Comments (RFC) 3561, July 2003
Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 125–134, (2003)
Undercoffer, J., Joshi, A.: Neighborhood watch: an intrusion detection and response protocol for Mobile Ad-hoc Networks. Technical Report UMBC, October 2002
Uppsala University AODV implementation. http://www.docs.uu. se/docs/research/projects/scanet/aodv/aodvuu.shtml
Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion detection techniques for Mobile Wireless Networks. Wireless Networks 9(5), September 2003
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bononi, L., Tacconi, C. Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. Int. J. Inf. Secur. 6, 379–392 (2007). https://doi.org/10.1007/s10207-007-0035-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-007-0035-9