Process Calculi for Intrusion Detection System in Mobile
Ad-hoc Networks
Parul Yadav
1
and Manish Gaur
2
1
Institute of Engineering & Technology, Lucknow, U.P., 226021, India
2
Centre for Advanced Studies, Lucknow, U.P., 226021, India
Email: parul.pec@gmail.com; manish.gaur@ietlucknow.ac.in
Abstract —Security of routing protocols is one of the crucial
and emerging issues in Mobile Ad-hoc Networks. A lot of
secure versions of routing protocols in Mobile Ad-hoc
Networks have already been proposed by eminent researchers.
But most of them are tested by means of simulation. Simulation
techniques have their limitations as they can only find presence
of error rather than absence of error. To overcome this situation,
formal methods are used that can verify systems using theorem
proving or automated model checking techniques. We are the
first who propose a calculi for Intrusion Detection System (IDS)
to secure routing in Mobile Ad-hoc Networks in a process
algebraic framework. The proposed calculi is basically an
extension of distributed pi calculus (Dpi). The novelty of the
proposed calculi is to model stand-alone IDS covering both
network & host-based IDSs. The calculi has two syntactic
categories: one for nodes and another for processes. We justify
our model by providing its reduction equivalence, after
abstracting away the details of IDS (implementation), to its
specification calculus for energy-aware broadcast, unicast and
multicast communications of MANETs (E-BUM). We believe
that such modelling helps in detecting intrusion(s) in Mobile
Ad-hoc Networks and that in turn will provide secure and
energy efficient route.
Index Terms—Process algebra for IDS, calculus for intrusion
detection system in MANETs, formal framework for security in
MANETs
I. INTRODUCTION
Mobile Ad-hoc Network, an ultimate dimension of
wireless networks, is an arbitrary collection of
independent nodes that can form or deform the network
on the fly without any administration or infrastructure
[1]-[3]. Mobile ad-hoc network allows nodes to
communicate with each other via radio transceivers that
have limited radio transmission range. Highly dynamic
topology and infrastructure-less architecture of MANETs
make these innovative networks vulnerable to various
security attacks [4]. In Mobile Ad-hoc Networks, security
attacks can be classified according to their origin or their
nature. Based on the origin, attacks are divided into two
categories, external and internal [4]. On the basis of
operation of the network, attacks in mobile ad-hoc
networks are categorized as active and passive attack.
Besides it, routing attacks are also classified into five
Manuscript received April 20, 2018; revised October 8, 2018.
Corresponding author email: parul.pec@gmail.com.
doi:10.12720/jcm.13.11.635-647
categories: attacks using impersonation, modification,
fabrication, replay, and Denial of Service (DoS). Thus
security of routing protocols for mobile ad-hoc networks
is an active area of research [4].
The challenge of MANETs is to design and verify
robust routing protocol with adequate security schemes
for these innovative networks. Various secure routing
protocols have already been proposed in [5]-[10]. Most of
these, verified using simulation tools [11], still have flaws.
The simulation-tools have certain limitations like
scenario specific results, limited scalability etc.. Thus,
simulation tool [12] can not be used to verify these
systems by exploring all conditions related to them. On
the other hand, using formal methods, these systems can
be modelled, and then verified using theorem prover or
(semi) automated model checking techniques.
Researchers in [13]-[17] provide formal frameworks to
model basic properties like node mobility, local broadcast
and dynamic topology etc. of MANETs and attack
prevention technique like public key cryptography
mechanism for secure routing in MANETs. Attack
prevention techniques, a first line of defence, such as
encryption, key management and authentication can
prevent the network from a set of known attacks. Thus, in
addition to prevention, second line of defence called as
detection and response is also required to deploy layered
security mechanism. One of the such detection and
response systems is called as Intrusion Detection System
[18].
The objective of this research paper is to model an
Intrusion Detection System for secure routing in
MANETs [3] in a process algebraic framework [19]. This
detection model will detect intrusion(s) in MANETs that
will result in providing secure route. Our proposed model
or calculi will also ensure energy efficient route [3]. We
intend to extend Distributed pi calculus for modelling
MANET.
In our proposed calculi named as dRi , a system term
will have an evolution like S S
c c
where
S
c
is a well-formed configuration, S is a system
term and S is its reduced form after the reduction taken
place. System term S can be typically of the form
r
P n D I ,
with network address n , physical
location , transmission radius r and process P , data
Journal of Communications Vol. 13, No. 11, November 2018
©2018 Journal of Communications 635