Intrusion Detection in Wireless Ad-Hoc Networks Intrusion Detection in Wireless Ad-Hoc Networks Edited by Nabendu Chaki • Rituparna Chaki CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130808 International Standard Book Number-13: 978-1-4665-1567-3 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To our beloved mothers, Hasi Chaki and Tamishra Chatterjee Nabendu and Rituparna Contents Preface ix about the editors xi contributors xiii chaPter 1 introduction 1 NOVARUN DEB, MANALI CHAKRABORTY, AND NABENDU CHAKI chaPter 2 architecture and organization issues 43 MANALI CHAKRABORTY, NOVARUN DEB, DEBDUTTA BARMAN ROY, AND RITUPARNA CHAKI chaPter 3 routing for ad- hoc networks 73 DEBDUTTA BARMAN ROY AND RITUPARNA CHAKI chaPter 4 different tyPes of attacks for wans 95 DEBDUTTA BARMAN ROY AND RITUPARNA CHAKI chaPter 5 honesty and trust- based ids solutions 111 NOVARUN DEB, MANALI CHAKRABORTY, AND NABENDU CHAKI chaPter 6 blackhole attack detection technique 147 DEBDUTTA BARMAN ROY AND RITUPARNA CHAKI vii viii Contents chaPter 7 intrusion detection for wireless Mesh networks 171 NOVARUN DEB, MANALI CHAKRABORTY, AND NABENDU CHAKI chaPter 8 future trends in wan security 201 TAPALINA BHATTASALI, MANALI CHAKRABORTY, AND NABENDU CHAKI index 231 Preface It’s a great pleasure to introduce this book on intrusion detection sys- tems (IDSs) for wireless ad-hoc networks. The book aims to ease the job of future researchers working in the field of network security. This book covers the security aspects for all the basic categories of wireless ad-hoc networks and related application areas, with a focus on IDSs. The categories included are mobile ad-hoc networks (MANETs), wireless mesh networks (WMNs), and wireless sensor networks (WSNs). In the book’s eight chapters, the state-of-the-art IDSs for these variants of wireless ad-hoc networks have been reviewed and ana- lyzed. The book also presents advanced topics, such as security in the smart power grid, securing cloud services, and energy-efficient IDSs. It has been organized in the form of an edited volume with eight chapters, each coauthored by one or more of our senior research schol- ars and ourselves. We thank and appreciate Novarun Deb, Manali Chakraborty, Debdutta Barman Roy, and Tapalina Bhattasali not only for their chapter contributions, but also for their hard work and innovative suggestions in preparing the manuscript. We especially mention Novarun and Manali for going through the drafts of all the chapters again and again toward improving the quality and content. This has gone a long way toward making this a comprehensive research title in the area of intrusion detection for wireless ad-hoc networks. ix
Description: