Abstract
Intrusion detection and secure routing schemes have been proposed for increasing the security and reliability in critical scenarios like mobile ad hoc networks. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and SUCV (Statistically Unique and Cryptographically Verifiable) identifiers. The proposed IDS has been used for the support of secure AODV routing, named IDS-based Secure AODV (IS-AODV), in a wireless ad hoc network scenario. Our IDS solution is based on the detection of behavior anomalies on behalf of neighbor hosts, with passive reactions, aiming to create a cluster whose route paths will include only safe nodes, eventually. Simulation results show that the proposed IDS is effective in isolating misbehaving hosts, and it assists the AODV secure routing scheme to converge in finding end-to-end safe routes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Albers, P., Camp, O., Parcher, J.M., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: WIS 2002. 4th Int’l Conf. on Enterprise Information Systems (2002)
Clausen, T., Jaquet, P., Laouti, A., Minet, P., Muhlethaler, P., Quyyum, A., Viennot, L.: Optimized Link State Routing Protocol, Internet Draft, draft-ietf-manet-olsr-06.txt, work in progress (September 2001)
Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications (August 1994)
Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR), Internet Draft, draft-ietf-manet-dsr-07.txt, work in progress (February 2002)
Perkins, C., Belding-Royer, E.: Ad hoc On-demand Distance Vector (AODV), Request For Comments (RFC) 3561 (July 2003)
Bhargava, S., Agrawal, D.P.: Security Enhancements in AODV protocol for Wireless Ad Hoc Networks. In: Proc. of Vehicular Technology Conference (2001)
Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications (October 2002)
Ning, P., Sun, K.: How To Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point (June 2003), pp. 60–67 (2003)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-hoc Networks. In: Proceedings of the 6th Annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. In: RAWCON 2003, Proceedings of the Radio and Wireless Conference (2003)
Yongguang, Z., Wenke, L., Yi-An, H.: Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks 9(5) (September 2003)
Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-based Intrusion Detection System for AODV. In: Proc. of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 125–134 (2003)
Undercoffer, J., Joshi, A.: Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad-hoc Networks. Tech. Rep., UMBC (October 2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems, Modelling and Simulation Conference (CNDS 2002), pp. 27–31 (January 2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-demand Routing Protocol for Ad hoc Networks. In: Proceedings of the 8th ACM International Conference on (MobiCom 2002), pp. 12–23 (September 2002)
Dahill, B., Levine, B.N., Royer, E.M., Shields, C.: A Secure Routing Protocol for Ad hoc Networks, Tech. Rep., UM-CS-2001-037, Univ. of Massachusetts (August 2001)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Wireless Ad hoc Networks. In: Proceedings of the 4th IEEE Workshop on mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13 (June 2002)
Michiardi, P., Molva, R.: Core: A COllaborative REputation mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proocedings of IFIP Communication and Multimedia Security Conference (2002)
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: MobiHoc 2002 (2002)
Montenegro, G., Castelluccia, C.: Crypto-Based Identifiers (CBIDs): Concept and Applications. ACM transaction on information and system security 7(1), 97–127 (2004)
Castelluccia, C., Montenegro, G.: Protecting AODV against Impersonation Attack. ACM Mobile Computing and Communications Review 6(3) (July 2002)
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. of PerCom 2005 (2005)
Uppsala University AODV implementation, http://www.docs.uu.se/docs/research/projects/scanet/aodv/aodvuu.shtml
Technical Report (IS-AODV), http://www.cs.unibo.it/~bononi/Publications/is-aodv_tr_2006.pdf
Bobba, R.B., Eschenauer, L., Gligor, V.D., Arbaugh, W.: Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. In: Proc. IEEE Global Telecommunications Conference (December 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bononi, L., Tacconi, C. (2006). A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_29
Download citation
DOI: https://doi.org/10.1007/11836810_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38341-3
Online ISBN: 978-3-540-38343-7
eBook Packages: Computer ScienceComputer Science (R0)