Security through Collaboration in MANETs

被引:0
|
作者
Li, Wenjia [1 ]
Parker, James [1 ]
Joshi, Anupam [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
outlier detection; mobile ad hoc network; misbehavior; gossiping;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behavior such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative outlier detection algorithm for MANETs that factors in a nodes reputation. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.
引用
收藏
页码:696 / 714
页数:19
相关论文
共 50 条
  • [21] Enabling context-aware group collaboration in MANETs
    Bottazzi, D
    Corradi, A
    Montanari, R
    [J]. ISADS 2005: International Symposium on Autonomous Decentralized Systems,Proceedings, 2005, : 310 - 318
  • [22] Enhancing the Security of MANETs Using Hash Algorithms
    Ravilla, Dilli
    Putta, Chandra Shekar Reddy
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 196 - 206
  • [23] Asymmetric and Dynamic Encryption for Routing Security in MANETs
    Echchaachoui, Adel
    Choukri, Ali
    Habbani, Ahmed
    Elkoutbi, Mohamed
    [J]. 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 825 - 830
  • [24] Wireless Information-Theoretic Security in MANETs
    Chrysikos, Theofilos
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    Dagiuklas, Tasos
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 692 - 696
  • [25] MANETS: AN EXCLUSIVE CHOICE BETWEEN USE AND SECURITY?
    Bonnefoi, Pierre-Francois
    Sauveron, Damien
    Park, Jong Hyuk
    [J]. COMPUTING AND INFORMATICS, 2008, 27 (05) : 799 - 821
  • [26] Dual Security Against Grayhole Attack in MANETs
    Patel, Ankit D.
    Chawda, Kartik
    [J]. INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 33 - 37
  • [27] Enhanced security to MANETs using digital codes
    Ahmad, Syed Jalal
    Unissa, Ishrath
    Ali, M. Shoukath
    Kumar, Abhay
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [28] A SECURITY ARCHITECTURE FOR INFORMATION ASSURANCE AND AVAILABILITY IN MANETS
    Stavrou, Angelos
    Ghosh, Anup K.
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 944 - +
  • [29] Many-to-many communication:A new approach collaboration in MANETs
    de Moraes, Renato M.
    Sadjadpour, Hamid R.
    Garcia-Luna-Aceves, J. J.
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1829 - +
  • [30] Security and performance analysis of the SEAP authentication protocol in MANETs
    Maity, Soumyadev
    Hansdah, R. C.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 24 (03) : 183 - 203