Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
DESERT: a decentralized monitoring tool generator
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract)
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
On the performance of a hybrid intrusion detection architecture for voice over IP systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A passive conformance testing approach for a MANET routing protocol
Proceedings of the 2009 ACM symposium on Applied Computing
A distributed monitoring system for enhancing security and dependability at architectural level
Architecting dependable systems IV
Security analysis of TORA routing protocol
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Toward specification-based intrusion detection for web applications
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
International Journal of Communication Systems
A finite transition model for security protocol verification
Proceedings of the 6th International Conference on Security of Information and Networks
Using transition systems to model and verify the implementation of security protocol
Proceedings of the 6th International Conference on Security of Information and Networks
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET present serious vulnerabilities to security attacks. In this paper, we propose an intrusion detection scheme based on extended finite state machines (EFSM). We provide a formal specification of the correct behavior of the routing protocol and by the means of a backward checking algorithm, detect run-time violations of the implementation. We choose the standard proactive routing protocol OLSR as a case study and show that our approach allows to detect several kinds of attacks as well as conformance anomalies.