Abstract
Mobile ad hoc networks are wireless networks consisting of mobile nodes with no boundary. Nodes are free to move and the network is dynamic. Unique features of these networks serve as benefits as well as drawbacks and give chances to attackers. Intrusion occurs when a malicious node tries to enter the network and misuses the resources. Several attacks and intrusion detection techniques are discussed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anantvalee, Tiranuch, and Jie Wu. “A survey on intrusion detection in mobile ad hoc networks.” Wireless Network Security. Springer US, 2007. 159–180.
L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
Zhang, Yongguang, Wenke Lee, and Yi-An Huang. “Intrusion detection techniques for mobile wireless networks.” Wireless Networks 9.5 (2003): 545–556.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks”, in Proc. 6th ACM International Conference on Mobile Computing and Networking,, Boston, USA, August 2000, pp. 255–265.
Nasser, Nidal, and Yunfeng Chen. “Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks.” Communications, 2007. ICC’07. IEEE International Conference on. IEEE, 2007.
K. Balakrishnan, J. Deng, and P.K. Varshney, -TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,ǁ Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.
Al-Roubaiey, Anas, et al. “AACK: adaptive acknowledgment intrusion detection for MANET with node detection enhancement.” Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, 2010.
Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. “EAACK—a secure intrusion-detection system for MANETs.” Industrial Electronics, IEEE Transactions on 60.3 (2013): 1089–1098.
Chang, Katharine, and Kang G. Shin. “Application-Layer Intrusion Detection in MANETs.” System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010.
Mohammed, Noman, et al. “Mechanism design-based secure leader election model for intrusion detection in MANET.” Dependable and Secure Computing, IEEE Transactions on 8.1 (2011): 89–103.
Li, Huike, and Daquan Gu. “A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks.” Web Mining and Web-based Application, 2009. WMWA’09. Second Pacific-Asia Conference on. IEEE, 2009.
Liu, Jie, et al. “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks.” Wireless Communications, IEEE Transactions on 8.2 (2009): 806–815.
Sun, B., Wu, K., and Pooch, U.W., (2006). Zone-Based Intrusion Detection for Mobile Ad Hoc Networks, International Journal of Ad Hoc & Sensor Wireless Networks, 3, 2.
Şen, Sevil, John A. Clark, and Juan E. Tapiador. “Power-aware intrusion detection in mobile ad hoc networks.” Ad hoc networks. Springer Berlin Heidelberg, 2010. 224–239.
Abbas, Sonya, et al. “Lightweight Sybil attack detection in MANETs.” Systems Journal, IEEE 7.2 (2013): 236–248.
Xiaopeng, Gao, and Chen Wei. “A novel gray hole attack detection scheme for mobile ad-hoc networks.” Network and Parallel Computing Workshops, 2007. NPC workshops. IFIP International Conference on. IEEE, 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Kundu, P., Kashyap, N., Yadav, N. (2016). Literature Survey on Intrusion Detection Systems in MANETs. In: Satapathy, S., Mandal, J., Udgata, S., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2755-7_38
Download citation
DOI: https://doi.org/10.1007/978-81-322-2755-7_38
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2753-3
Online ISBN: 978-81-322-2755-7
eBook Packages: EngineeringEngineering (R0)