skip to main content
10.1145/1163673.1163679acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Securing the AODV protocol using specification-based intrusion detection

Published: 02 October 2006 Publication History

Abstract

This paper presents an implementation of an Intrusion Detection System (IDS) aiming to secure the AODV protocol designed for MANET. The IDS is designed as multiple static agents that run on a subset of the nodes in the network and executes a monitoring protocol that observes the process of route establishment. The monitoring protocol uses specification based intrusion detection to identify misuses to the routing messages. The IDS design is a correlation of previous work done in the field of MANET security. The IDS is implemented using ns-2 simulator and its ability to detect attacks was tested using previously devised attack scripts. Detailed specification for the runtime behavior of the AODV protocol was derived in the process of implementation

References

[1]
Karchirski, O. and Guha, R., "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks", In Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) p.57.
[2]
Tseng, C., Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K., "A Specification-based Intrusion Detection System for AODV", Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 125--134. http://portal.acm.org/citation.cfm?id=986858.986876
[3]
Ning, P., Sun, K., "How to Misuse AODV: A case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols", In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pp. 60--67, West Point, June 2003.
[4]
Perkins, C. E., Royer, E. M., "Ad hoc On-Demand Distance Vector Routing", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90--100.

Cited By

View all
  • (2024)RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00043(353-361)Online publication date: 24-Jun-2024
  • (2021)Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc NetworksWireless Personal Communications10.1007/s11277-021-09418-8124:2(1511-1524)Online publication date: 30-Nov-2021
  • (2019)Hybrid Intrusion Detection Framework for Ad Hoc NetworksSecuring the Internet of Things10.4018/978-1-5225-9866-4.ch060(1312-1346)Online publication date: 6-Sep-2019
  • Show More Cited By

Index Terms

  1. Securing the AODV protocol using specification-based intrusion detection

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
        October 2006
        146 pages
        ISBN:1595934863
        DOI:10.1145/1163673
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 02 October 2006

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. AODV
        2. IDS
        3. network monitoring
        4. specification-based detection

        Qualifiers

        • Article

        Conference

        MSWiM06
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 46 of 131 submissions, 35%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 19 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58291.2024.00043(353-361)Online publication date: 24-Jun-2024
        • (2021)Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc NetworksWireless Personal Communications10.1007/s11277-021-09418-8124:2(1511-1524)Online publication date: 30-Nov-2021
        • (2019)Hybrid Intrusion Detection Framework for Ad Hoc NetworksSecuring the Internet of Things10.4018/978-1-5225-9866-4.ch060(1312-1346)Online publication date: 6-Sep-2019
        • (2017)Diagnosing False Data Injection Attacks in the Smart Grid: a Practical Framework for Home-area NetworksProceedings of the 1st EAI International Conference on Smart Grid Assisted Internet of Things10.4108/eai.7-8-2017.152988(44-53)Online publication date: 7-Aug-2017
        • (2016)Hybrid Intrusion Detection Framework for Ad hoc networksInternational Journal of Information Security and Privacy10.4018/IJISP.201610010110:4(1-32)Online publication date: 1-Oct-2016
        • (2016) An efficient intrusion detection and prevention framework for ad hoc networks Information and Computer Security10.1108/ICS-08-2015-003424:4(298-325)Online publication date: 10-Oct-2016
        • (2016)Intrusion detection in mobile ad hoc networksSecurity and Communication Networks10.1002/sec.14849:14(2484-2556)Online publication date: 25-Sep-2016
        • (2015)Correlative monitoring for detection of false data injection attacks in smart grids2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)10.1109/SmartGridComm.2015.7436331(386-391)Online publication date: Nov-2015
        • (2014)A specification-based intrusion detection engine for infrastructure-less networksComputer Communications10.1016/j.comcom.2014.08.00254:C(67-83)Online publication date: 1-Dec-2014
        • (2012)Securing the 802.11 MAC in MANETs: A specification-based intrusion detection engine2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS)10.1109/WONS.2012.6152225(16-22)Online publication date: Jan-2012
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media