Skip to main content

Literature Survey on Intrusion Detection Systems in MANETs

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 433))

Abstract

Mobile ad hoc networks are wireless networks consisting of mobile nodes with no boundary. Nodes are free to move and the network is dynamic. Unique features of these networks serve as benefits as well as drawbacks and give chances to attackers. Intrusion occurs when a malicious node tries to enter the network and misuses the resources. Several attacks and intrusion detection techniques are discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anantvalee, Tiranuch, and Jie Wu. “A survey on intrusion detection in mobile ad hoc networks.” Wireless Network Security. Springer US, 2007. 159–180.

    Google Scholar 

  2. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.

    Google Scholar 

  3. Zhang, Yongguang, Wenke Lee, and Yi-An Huang. “Intrusion detection techniques for mobile wireless networks.” Wireless Networks 9.5 (2003): 545–556.

    Google Scholar 

  4. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, in Proc. 6th ACM International Conference on Mobile Computing and Networking,, Boston, USA, August 2000, pp. 255–265.

    Google Scholar 

  5. Nasser, Nidal, and Yunfeng Chen. “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks.” Communications, 2007. ICC’07. IEEE International Conference on. IEEE, 2007.

    Google Scholar 

  6. K. Balakrishnan, J. Deng, and P.K. Varshney, -TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,ǁ Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.

    Google Scholar 

  7. Al-Roubaiey, Anas, et al. “AACK: adaptive acknowledgment intrusion detection for MANET with node detection enhancement.” Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, 2010.

    Google Scholar 

  8. Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. “EAACK—a secure intrusion-detection system for MANETs.” Industrial Electronics, IEEE Transactions on 60.3 (2013): 1089–1098.

    Google Scholar 

  9. Chang, Katharine, and Kang G. Shin. “Application-Layer Intrusion Detection in MANETs.” System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010.

    Google Scholar 

  10. Mohammed, Noman, et al. “Mechanism design-based secure leader election model for intrusion detection in MANET.” Dependable and Secure Computing, IEEE Transactions on 8.1 (2011): 89–103.

    Google Scholar 

  11. Li, Huike, and Daquan Gu. “A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks.” Web Mining and Web-based Application, 2009. WMWA’09. Second Pacific-Asia Conference on. IEEE, 2009.

    Google Scholar 

  12. Liu, Jie, et al. “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.” Wireless Communications, IEEE Transactions on 8.2 (2009): 806–815.

    Google Scholar 

  13. Sun, B., Wu, K., and Pooch, U.W., (2006). Zone-Based Intrusion Detection for Mobile Ad Hoc Networks, International Journal of Ad Hoc & Sensor Wireless Networks, 3, 2.

    Google Scholar 

  14. Şen, Sevil, John A. Clark, and Juan E. Tapiador. “Power-aware intrusion detection in mobile ad hoc networks.” Ad hoc networks. Springer Berlin Heidelberg, 2010. 224–239.

    Google Scholar 

  15. Abbas, Sonya, et al. “Lightweight Sybil attack detection in MANETs.” Systems Journal, IEEE 7.2 (2013): 236–248.

    Google Scholar 

  16. Xiaopeng, Gao, and Chen Wei. “A novel gray hole attack detection scheme for mobile ad-hoc networks.” Network and Parallel Computing Workshops, 2007. NPC workshops. IFIP International Conference on. IEEE, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pooja Kundu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Kundu, P., Kashyap, N., Yadav, N. (2016). Literature Survey on Intrusion Detection Systems in MANETs. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2755-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2755-7_38

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2753-3

  • Online ISBN: 978-81-322-2755-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics