Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks 2003
DOI: 10.1145/986858.986876
|View full text |Cite
|
Sign up to set email alerts
|

A specification-based intrusion detection system for AODV

Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad hoc networks, offers quick adaptation to dynamic link conditions, low processing and memory overhead, and low network utilization. However, without keeping in mind the security issues in the protocol design, AODV is vulnerable to various kinds of attacks. This paper analyzes some of the vulnerabilities, specifically discussing attacks against AODV that manipulate the routing messages. We propose a solution based on specificati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
133
0
1

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 191 publications
(134 citation statements)
references
References 16 publications
(13 reference statements)
0
133
0
1
Order By: Relevance
“…One of the most commonly proposed intrusion detection techniques in MANETs is specification-based intrusion detection, where intrusions are detected as runtime violations of the specifications of routing protocols. This technique has been applied to a variety of routing protocols such as AODV and OLSR [27] [26]. There are also a few signature-based IDSs developed for MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…One of the most commonly proposed intrusion detection techniques in MANETs is specification-based intrusion detection, where intrusions are detected as runtime violations of the specifications of routing protocols. This technique has been applied to a variety of routing protocols such as AODV and OLSR [27] [26]. There are also a few signature-based IDSs developed for MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…Then the actual behavior is compared to the normal specification [49]. It uses distributed network monitor to trace the request-reply flow in the routing protocol.…”
Section: Review Of Manet Intrusion Detection Security Approachesmentioning
confidence: 99%
“…Most of the methods in our review, except the model proposed in [49], utilize anomaly detection. The anomaly detection is more suitable than misuse detection in Mobile Ad Hoc Networks.…”
Section: Review Of Manet Intrusion Detection Security Approachesmentioning
confidence: 99%
“…When an IDS agent detects a local intrusion, it initiates a global response: all IDS agents will cooperatively participate in global intrusion detection actions to isolate the corrupted node. In [12] the system uses Network Monitors distributed on a subset of selected nodes into the network, to detect attacks against AODV routing. In [13] the system uses an IDS based on neighbor node's snooping of packets transmissions: a node hearing two consecutive transmissions, along the path from source to destination, checks that the packet and its route information is not modified in flight by malicious nodes.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%