Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Unreliable failure detectors for reliable distributed systems
Journal of the ACM (JACM)
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks
International Journal of Information Security
Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Octopus-IIDS: An anomaly based intelligent intrusion detection system
ISCC '10 Proceedings of the The IEEE symposium on Computers and Communications
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
A great effort for the development of new communication technologies has been witnessed in the last decade. Among these new technologies are the Mobile Ad Hoc networks (MANETs), which form highly dynamic environments without the presence of concentrator units. As this new technology depends upon the cooperation of his entities for transmission and routing, any malicious or faulty node can spoil all the communication in these environments. Intrusion detection systems (IDS) have been applied as a possible solution. However, the proposed IDSs do not tolerate the presence of malicious or faulty nodes among the IDS nodes. Most of the studies in the literature does not employ the use of cryptographic mechanisms in the communication of IDS nodes, even if this communication depends on the cooperation of nodes that do not belong to the IDS. In this paper we propose a set of distributed algorithms for an IDS model that can support the presence, up to a established threshold, of malicious or faulty nodes at any IDS level. We employ distributed systems and fault tolerance techniques together with cryptographic mechanisms to detect and punish malicious or faulty nodes. We describe the proposed model, making a comparison with major efforts in the literature on distributed intrusion detection systems for MANETs and present the results of tests obtained with an implementation of the proposed model.