ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

被引:0
|
作者
Rahmanimanesh, M. [1 ]
Jalili, S. [1 ]
机构
[1] Tarbiat Modares Univ, Dept Elect & Comp Engn, Tehran, Iran
来源
IRANIAN JOURNAL OF FUZZY SYSTEMS | 2013年 / 10卷 / 02期
关键词
Ordered weighted averaging weight generation; Mobile ad hoc network; Anomaly detection; GROUP DECISION-MAKING; OWA OPERATOR WEIGHTS; AGGREGATION OPERATORS; INTRUSION DETECTION; MINIMAX DISPARITY; INFORMATION; DISTANCE; SYSTEM; MODEL;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used for combining one-class support vector machine (OCSVM), mixture of Gaussians (MoG), and self-organizing maps (SOM) one-class classifiers and the combined model is utilized to partially detect the attacks in cluster members. The votes of cluster members are periodically transmitted to the cluster head and final decision on attack detection is carried out in the cluster head. In the proposed method, an adaptive ordered weighted averaging (OWA) operator is used for aggregating the votes of cluster members in the cluster head. Since the network topology, traffic, and environmental conditions of a MANET as well as the number of nodes in each cluster dynamically change, the mere use of a fixed quantifier-based weight generation approach for OWA operator is not efficient. We propose a condition-based weight generation method for OWA operator in which the number of cluster members that participate in decision making may be varying in time and OWA weights are calculated periodically and dynamically based on the conditions of the network. Simulation results demonstrate the effectiveness of the proposed method in detecting rushing, RouteError fabrication, and wormhole attacks.
引用
收藏
页码:83 / 109
页数:27
相关论文
共 50 条
  • [21] Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
    Liu, Wei
    Nishiyama, Hiroki
    Ansari, Nirwan
    Yang, Jie
    Kato, Nei
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (02) : 239 - 249
  • [22] Replica dissemination and update strategies in cluster-based mobile ad hoc networks
    Denko, Mieso K.
    Lu, Hua
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 193 - 209
  • [23] An enhanced message exchange mechanism in cluster-based mobile ad hoc networks
    Lou, Wei
    Wu, Jie
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3358 : 223 - 232
  • [24] Routing anomaly detection in mobile ad hoc networks
    Sun, B
    Wu, K
    Pooch, UW
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 25 - 31
  • [25] Embedding a cluster-based overlay mesh in mobile ad hoc networks without cluster heads
    Banerjee, A
    King, CT
    Hsiao, HC
    2005 International Conference on Parallel Processsing, Proceedings, 2005, : 49 - 56
  • [26] Reliability for Cluster-based Ad-hoc Networks
    Cook, Jason L.
    Ramirez-Marquez, Jose Emmanuel
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2008 PROCEEDINGS, 2008, : 246 - +
  • [27] A cluster-based security architecture for ad hoc networks
    Bechler, M
    Hof, HJ
    Kraft, D
    Pählke, F
    Wolf, L
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2393 - 2403
  • [28] An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks
    El Khawaga, Sally E.
    Saleh, Ahmed I.
    Ali, Hesham A.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 69 : 54 - 76
  • [29] Reliable Virtual Cluster-Based Opportunistic Routing Protocol for Mobile Ad hoc Networks
    Vigita, E. Sahaya Rose
    Julie, E. Golden
    Selvi, S. Tamil
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 139 - 148
  • [30] Providing distributed certificate authority service in cluster-based mobile ad hoc networks
    Dong, Y.
    Sui, Ai-Fen
    Yiu, S. M.
    Li, Victor O. K.
    Hui, Lucas C. K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2442 - 2452