Skip to main content

A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks

  • Conference paper
Information Security (ISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4176))

Included in the following conference series:

Abstract

Intrusion detection and secure routing schemes have been proposed for increasing the security and reliability in critical scenarios like mobile ad hoc networks. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and SUCV (Statistically Unique and Cryptographically Verifiable) identifiers. The proposed IDS has been used for the support of secure AODV routing, named IDS-based Secure AODV (IS-AODV), in a wireless ad hoc network scenario. Our IDS solution is based on the detection of behavior anomalies on behalf of neighbor hosts, with passive reactions, aiming to create a cluster whose route paths will include only safe nodes, eventually. Simulation results show that the proposed IDS is effective in isolating misbehaving hosts, and it assists the AODV secure routing scheme to converge in finding end-to-end safe routes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albers, P., Camp, O., Parcher, J.M., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: WIS 2002. 4th Int’l Conf. on Enterprise Information Systems (2002)

    Google Scholar 

  2. Clausen, T., Jaquet, P., Laouti, A., Minet, P., Muhlethaler, P., Quyyum, A., Viennot, L.: Optimized Link State Routing Protocol, Internet Draft, draft-ietf-manet-olsr-06.txt, work in progress (September 2001)

    Google Scholar 

  3. Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications (August 1994)

    Google Scholar 

  4. Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR), Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress (February 2002)

    Google Scholar 

  5. Perkins, C., Belding-Royer, E.: Ad hoc On-demand Distance Vector (AODV), Request For Comments (RFC) 3561 (July 2003)

    Google Scholar 

  6. Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In: Proc. of Vehicular Technology Conference (2001)

    Google Scholar 

  7. Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications (October 2002)

    Google Scholar 

  8. Ning, P., Sun, K.: How To Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point (June 2003), pp. 60–67 (2003)

    Google Scholar 

  9. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th Annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  10. Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. In: RAWCON 2003, Proceedings of the Radio and Wireless Conference (2003)

    Google Scholar 

  11. Yongguang, Z., Wenke, L., Yi-An, H.: Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks 9(5) (September 2003)

    Google Scholar 

  12. Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-based Intrusion Detection System for AODV. In: Proc. of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 125–134 (2003)

    Google Scholar 

  13. Undercoffer, J., Joshi, A.: Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad-hoc Networks. Tech. Rep., UMBC (October 2002)

    Google Scholar 

  14. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems, Modelling and Simulation Conference (CNDS 2002), pp. 27–31 (January 2002)

    Google Scholar 

  15. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-demand Routing Protocol for Ad hoc Networks. In: Proceedings of the 8th ACM International Conference on (MobiCom 2002), pp. 12–23 (September 2002)

    Google Scholar 

  16. Dahill, B., Levine, B.N., Royer, E.M., Shields, C.: A Secure Routing Protocol for Ad hoc Networks, Tech. Rep., UM-CS-2001-037, Univ. of Massachusetts (August 2001)

    Google Scholar 

  17. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Wireless Ad hoc Networks. In: Proceedings of the 4th IEEE Workshop on mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13 (June 2002)

    Google Scholar 

  18. Michiardi, P., Molva, R.: Core: A COllaborative REputation mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proocedings of IFIP Communication and Multimedia Security Conference (2002)

    Google Scholar 

  19. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: MobiHoc 2002 (2002)

    Google Scholar 

  20. Montenegro, G., Castelluccia, C.: Crypto-Based Identifiers (CBIDs): Concept and Applications. ACM transaction on information and system security 7(1), 97–127 (2004)

    Article  Google Scholar 

  21. Castelluccia, C., Montenegro, G.: Protecting AODV against Impersonation Attack. ACM Mobile Computing and Communications Review 6(3) (July 2002)

    Google Scholar 

  22. Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. of PerCom 2005 (2005)

    Google Scholar 

  23. Uppsala University AODV implementation, http://www.docs.uu.se/docs/research/projects/scanet/aodv/aodvuu.shtml

  24. Technical Report (IS-AODV), http://www.cs.unibo.it/~bononi/Publications/is-aodv_tr_2006.pdf

  25. Bobba, R.B., Eschenauer, L., Gligor, V.D., Arbaugh, W.: Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. In: Proc. IEEE Global Telecommunications Conference (December 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bononi, L., Tacconi, C. (2006). A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_29

Download citation

  • DOI: https://doi.org/10.1007/11836810_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38341-3

  • Online ISBN: 978-3-540-38343-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics