Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

IDSs based on Stand-alone Architecture for MANET: A Survey

Kapil Dhamecha, Rutvik Upadhyay, Bhushan Trivedi Published in Mobile Networks

International Journal of Applied Information Systems
Year of Publication: 2012
© 2012 by IJAIS Journal
Download full text
  1. Kapil Dhamecha, Rutvik Upadhyay and Bhushan Trivedi. Article: IDSs based on Stand-alone Architecture for MANET: A Survey. International Journal of Applied Information Systems 4(10):13-19, December 2012. BibTeX

    	author = "Kapil Dhamecha and Rutvik Upadhyay and Bhushan Trivedi",
    	title = "Article: IDSs based on Stand-alone Architecture for MANET: A Survey",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 10,
    	pages = "13-19",
    	month = "December",
    	note = "Published by Foundation of Computer Science, New York, USA"


Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDSs for MANETs have attracted much attention recently and thus, there are many publications that propose new IDS solutions or improvements to the existing. Current IDSs pose challenges on not only capricious intrusion categories, but also huge computational power. Though there are a number of existing literatures to IDS issues, an attempt is made to give a more elaborate image for a comprehensive review on IDSs based on stand-alone architecture for MANETs, because of the uniqueness to identify the attack solely. In addition, the table and the figure summarized in the content contribute to easily grasp the overall picture of stand-alone IDSs along with existing open issues.


  1. H. Miranda and L. Rodrigues, 'Preventing selfishness in open mobile ad hoc networks,' in Proc. Of the Seventh CaberNet Radicals Workshop, October 2002.
  2. D. Djenouri, L. Khelladi, N. Badache, "A Survey of Security Issues in Mobile Ad Hoc Networks," IEEE Communications Surveys, Vol. 7, No. 4, Fourth Quarter 2005.
  3. S. Sen and J. A. Clark, "Intrusion Detection in Mobile Ad Hoc Networks". In: Guide to Wireless Ad Hoc Networks, S. Misra, I. Woungang, S. C. Misra (Eds. ), Springer, 2009.
  4. T. Anantvalee, J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, Chapter 7, pp. 170 - 196, 2006.
  5. C. Xenakis, C. Panos, I. Stavrakaki,"A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks" Computers and Security , Elsevier, pp. 63-80,2011.
  6. Y. Jain, R. Ahirwar,"Secure Mobile Agent Based IDS for MANET", International Journal of Computer Science and Information Technologies, Vol. 3 (4), pp. 4798-4805, 2012.
  7. G. A. Jacoby, N. J. Davis, "Mobile Host-Based intrusion Detection and Attack Identification, "IEEE Wireless Communications, vol. 14, issue 4, pp. 53-60, August 2007.
  8. K. Nadkarni, A. Mishra, "A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks," IEEE Wireless Communications and Networking Conference (WCNC. 2004), Vol. 2, pp. 831 – 836, March 2004.
  9. A. Lauf, R. A. Peters, W. H. Robinson, "A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Networks". Elsevier Journal of Ad Hoc Networks, vol. 8, issue 3, pp. 253-266, May 2010.
  10. S. Gavini," Detecting Packet dropping faults in Mobile Adhoc Networks", 2004.
  11. P. Kabiri, M. Again, "Feature Analysis for Intrusion Detection in Mobile Ad Hoc Networks",International Journal of Network Security, 12 (2), 80-87, 2011.
  12. J. Joseph, B. Lee, A. Das, & B. Seet, "Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA", Dependable and Secure Computing, IEEE Transactions, 8 (2), 233-245,2011.
  13. H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, & N. Kato," A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks", Vehicular Technology, IEEE Transactions on, 58(5), 2471-2481, 2009.
  14. S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks," Research Report cs. NI/0307012, Stanford University, 2003.
  15. S. Srivastava, N. Gupta, S. Chturvedi, S. Ghosh, "A Survey on Mobile Agent based Intrusion Detection System", ISDMISC, IJCA, 2011.
  16. D Kheyri1 & M Karami1,"A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET", Computer and Information Science; Vol. 5, No. 4; 2012.
  17. Y Huang, & L Wenke," A Cooperative Intrusion Detection System for Ad Hoc Networks", proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks2003.


Mobile Adhoc Network (MANET), Intrusion Detection System (IDS), stand-alone architecture