Process Calculi for Intrusion Detection System in Mobile Ad-hoc Networks Parul Yadav 1 and Manish Gaur 2 1 Institute of Engineering & Technology, Lucknow, U.P., 226021, India 2 Centre for Advanced Studies, Lucknow, U.P., 226021, India Email: parul.pec@gmail.com; manish.gaur@ietlucknow.ac.in Abstract Security of routing protocols is one of the crucial and emerging issues in Mobile Ad-hoc Networks. A lot of secure versions of routing protocols in Mobile Ad-hoc Networks have already been proposed by eminent researchers. But most of them are tested by means of simulation. Simulation techniques have their limitations as they can only find presence of error rather than absence of error. To overcome this situation, formal methods are used that can verify systems using theorem proving or automated model checking techniques. We are the first who propose a calculi for Intrusion Detection System (IDS) to secure routing in Mobile Ad-hoc Networks in a process algebraic framework. The proposed calculi is basically an extension of distributed pi calculus (Dpi). The novelty of the proposed calculi is to model stand-alone IDS covering both network & host-based IDSs. The calculi has two syntactic categories: one for nodes and another for processes. We justify our model by providing its reduction equivalence, after abstracting away the details of IDS (implementation), to its specification calculus for energy-aware broadcast, unicast and multicast communications of MANETs (E-BUM). We believe that such modelling helps in detecting intrusion(s) in Mobile Ad-hoc Networks and that in turn will provide secure and energy efficient route. Index TermsProcess algebra for IDS, calculus for intrusion detection system in MANETs, formal framework for security in MANETs I. INTRODUCTION Mobile Ad-hoc Network, an ultimate dimension of wireless networks, is an arbitrary collection of independent nodes that can form or deform the network on the fly without any administration or infrastructure [1]-[3]. Mobile ad-hoc network allows nodes to communicate with each other via radio transceivers that have limited radio transmission range. Highly dynamic topology and infrastructure-less architecture of MANETs make these innovative networks vulnerable to various security attacks [4]. In Mobile Ad-hoc Networks, security attacks can be classified according to their origin or their nature. Based on the origin, attacks are divided into two categories, external and internal [4]. On the basis of operation of the network, attacks in mobile ad-hoc networks are categorized as active and passive attack. Besides it, routing attacks are also classified into five Manuscript received April 20, 2018; revised October 8, 2018. Corresponding author email: parul.pec@gmail.com. doi:10.12720/jcm.13.11.635-647 categories: attacks using impersonation, modification, fabrication, replay, and Denial of Service (DoS). Thus security of routing protocols for mobile ad-hoc networks is an active area of research [4]. The challenge of MANETs is to design and verify robust routing protocol with adequate security schemes for these innovative networks. Various secure routing protocols have already been proposed in [5]-[10]. Most of these, verified using simulation tools [11], still have flaws. The simulation-tools have certain limitations like scenario specific results, limited scalability etc.. Thus, simulation tool [12] can not be used to verify these systems by exploring all conditions related to them. On the other hand, using formal methods, these systems can be modelled, and then verified using theorem prover or (semi) automated model checking techniques. Researchers in [13]-[17] provide formal frameworks to model basic properties like node mobility, local broadcast and dynamic topology etc. of MANETs and attack prevention technique like public key cryptography mechanism for secure routing in MANETs. Attack prevention techniques, a first line of defence, such as encryption, key management and authentication can prevent the network from a set of known attacks. Thus, in addition to prevention, second line of defence called as detection and response is also required to deploy layered security mechanism. One of the such detection and response systems is called as Intrusion Detection System [18]. The objective of this research paper is to model an Intrusion Detection System for secure routing in MANETs [3] in a process algebraic framework [19]. This detection model will detect intrusion(s) in MANETs that will result in providing secure route. Our proposed model or calculi will also ensure energy efficient route [3]. We intend to extend Distributed pi calculus for modelling MANET. In our proposed calculi named as dRi , a system term will have an evolution like S S c c where S c is a well-formed configuration, S is a system term and S is its reduced form after the reduction taken place. System term S can be typically of the form  r P n D I , with network address n , physical location , transmission radius r and process P , data Journal of Communications Vol. 13, No. 11, November 2018 ©2018 Journal of Communications 635