Survey on IDS for Addressing Security Issues of MANETS

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 8
Year of Publication : 2014
Authors : Agna Jose E, Manu M.R

How to Cite?

Agna Jose E, Manu M.R, "Survey on IDS for Addressing Security Issues of MANETS," SSRG International Journal of Computer Science and Engineering , vol. 1,  no. 8, pp. 1-5, 2014. Crossref,


Applications based on the mobility and scalability is one of the common phenomenon for current wireless network. Among all the up to date wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. MANET consists of mobile nodes which are free to move arbitrarily. MANETs are highly vulnerable for passive and active attacks because of their open medium, rapidly changing topology, lack of centralized monitoring. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. It is crucial to develop suitable intrusion detection scheme to protect MANET from malicious attackers. In this paper we describe different intrusion detection systems on manet.


Enhanced Adaptive Acknowledgment Intrusion Detection System, Mobile AdHoc


[1] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad-hoc networks,” in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265. .
[2] N. Nasser and Y. Chen, “Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,” in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159. .
[3] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007. .
[4] EAACK – A Secure Intrusion Detection System for MANETs, Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, 2012. .
[5] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting forged acknowledgements in MANETs,” in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494. .
[6] A.Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37. .
[7] T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc etworks,” in Wireless/Mobile Security. New York: Springer- Verlag, 2008. .
[8] A.Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, “Secure routing and intrusion detection in ad hoc networks,” in Proc. 3rd Int. Conf.Pervasive Comput. Commun., 2005, pp. 191–199. .
[9] D. Johnson and D. Maltz, “Dynamic Source Routing in ad hoc wireless networks,” in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181. .
[10] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752. .
[11] B. Sun, “Intrusion detection in mobile ad hoc networks,” Ph.D. dissertation, Texas A&M Univ., College Station, TX, 2004. .
[12] L. Zhou and Z. Haas, “Securing ad-hoc networks,” IEEE Netw., vol. 13, no. 6, pp. 24–30, Nov./Dec. 1999. .
[13] R. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of ACM 21 (2): 120-126, 1978. .
[14] W. Diffie and M. E. Hellman. New Directions in Cryptography. In 1976 IEEE Transactions on Information Theory, IT-11: 644- 654, 1976. .
[15] Nat. Inst. Std. Technol., Digital Signature Standard (DSS) Federal InformationProcessing Standards Publication, Gaithersburg, MD, 2009, Digital Signature Standard (DSS). .
[16] A.Singh, M. Maheshwari, and N. Kumar, “Security and trust management in MANET,” in Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387. .
[17] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” in Lecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666. .
[18] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting misbehaving nodes in MANETs,” in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222.
[19] Liu, Kejun.”Detecting Routing Misbehavior In Mobile AdHoc Network.”(2006).