Security through Collaboration in MANETs

被引:0
|
作者
Li, Wenjia [1 ]
Parker, James [1 ]
Joshi, Anupam [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
outlier detection; mobile ad hoc network; misbehavior; gossiping;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behavior such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative outlier detection algorithm for MANETs that factors in a nodes reputation. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.
引用
收藏
页码:696 / 714
页数:19
相关论文
共 50 条
  • [1] Security Through Collaboration and Trust in MANETs
    Li, Wenjia
    Parker, James
    Joshi, Anupam
    [J]. MOBILE NETWORKS & APPLICATIONS, 2012, 17 (03): : 342 - 352
  • [2] Security Through Collaboration and Trust in MANETs
    Wenjia Li
    James Parker
    Anupam Joshi
    [J]. Mobile Networks and Applications, 2012, 17 : 342 - 352
  • [3] Enhancing Security in MANETS through Trust-Aware Routing
    Bhargavi, V. Sesha
    Raju, S. Viswanadha
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1940 - 1943
  • [4] The establishment of collaboration in managing information security through multisourcingThe establishment of collaboration in managing information security through multisourcing
    Naicker, V.
    Mafaiti, M.
    [J]. COMPUTERS & SECURITY, 2019, 80 : 224 - 237
  • [5] SECURITY MECHANISM FOR MANETS
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2009, 4 (02) : 231 - 242
  • [6] On the Security of Route Discovery in MANETs
    Burmester, Mike
    de Medeiros, Breno
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (09) : 1180 - 1188
  • [7] A Security Service Protocol for MANETs
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1076 - 1077
  • [8] UMPIRING SECURITY MODELS FOR MANETS
    Kathirvel, Ayyaswamy
    [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2012, 12 (01): : 39 - 40
  • [9] Security of Predefined Groups in MANETs
    Lebegue, Jerome
    Bidan, Christophe
    Plesse, Thierry
    [J]. Q2SWINET'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON Q2S AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2007, : 164 - 167
  • [10] Demonstration of security through collaboration in the Digital Business Ecosystem
    Seigneur, Jean-Marc
    [J]. 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 111 - 112