Outlier Detection using Naive Bayes in Wireless Ad Hoc Networks

被引:0
|
作者
Ren, Yonglin [1 ]
Pazzi, Richard W. [1 ]
Boukerche, Azzedine [1 ]
机构
[1] Univ Ottawa, SITE, PARADISE Res Lab, Ottawa, ON, Canada
关键词
Wireless Security; Outlier Detection; Naive Bayes Classifier; Trust Evaluation; Wireless Networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, security is one of the most significant concerns when constructing a flexible and improvisational network. For a wireless ad hoc network, which is exposed to an open and cooperative environment, its vulnerability needs a more effective protection for the validation of information sharing, when compared to traditional networks. At present, trust gains extensive attention as it is regarded as a well-known distributed management method to perceive abnormal behavior of other nodes. In this paper, we emphasize the importance of node cooperation, especially for the sharing of trust information. Thereby, an outlier detection scheme is presented based on Naive Bayes algorithm, which is used to predict the reliability of trust information provided by other adjacent nodes. We examine the scheme based on our design criteria and attack models. Through the security analysis, Naive Bayes makes the trust-based outlier detection more suitable and reliable for distributed networks.
引用
收藏
页码:109 / 115
页数:7
相关论文
共 50 条
  • [21] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [22] Byzantine Failure Detection in Wireless Ad-Hoc Networks
    Sota, Norihiro
    Higaki, Hiroaki
    2015 36TH IEEE SARNOFF SYMPOSIUM, 2015, : 173 - 178
  • [23] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    Recent Advances in Engineering and Computer Science 2007, 2006, 62 : 44 - 48
  • [24] Detection, penalization and handling of misbehavior in ad hoc wireless networks
    Bora, Revoti Prasad
    Harihar, Dheeraj
    Sehrawat, Saurabh
    IMECS 2006: International Multiconference of Engineers and Computer Scientists, 2006, : 949 - 953
  • [25] DelPHI: Wormhole detection mechanism for ad hoc wireless networks
    Chiu, Hon Sun
    Lui, King-Shan
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 149 - +
  • [26] Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
    Khalil, Issa
    Bagchi, Saurabh
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) : 1096 - 1112
  • [27] Model selection for anomaly detection in wireless ad hoc networks
    Deng, Hongmei
    Xu, Roger
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 540 - 546
  • [28] A Distributed Intrusion Detection System for Wireless Ad Hoc Networks
    Sen, Jaydip
    Ukil, Arijit
    Bera, Debasish
    Pal, Arpan
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 363 - 368
  • [29] Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
    Dong, Dezun
    Li, Mo
    Liu, Yunhao
    Li, Xiang-Yang
    Liao, Xiangke
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 314 - +
  • [30] Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
    Dong, Dezun
    Li, Mo
    Liu, Yunhao
    Li, Xiang-Yang
    Liao, Xiangke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) : 1787 - 1796