Distributed Court System for intrusion detection in mobile ad hoc networks

被引:7
|
作者
Zhang, Da [1 ]
Yeo, Chai Kiat [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, CeMNet Lab, Div Comp Commun, Singapore 639798, Singapore
关键词
Routing layer; Security; Mobile ad hoce networks; Intrusion detection system; Malicious accusation; SECURITY;
D O I
10.1016/j.cose.2011.09.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing routing layer functions in mobile ad hoc networks is an important it sue, which includes many challenges like how to enhance detection accuracy when facing the highly dynamic characteristic of such networks, and how to distinguish malicious accusations under a totally autonomous structure. In this paper, we propose Distributed Court System (DCS), a complete Intrusion Detection System that intends to solve these challenges in a low-cost and robust way. We do not deploy any centralized entity, but rely on the collaboration among the nodes neighbouring the suspected node, to integrate information, improve the detection accuracy, and reject dissemination of malicious accusation. Through mathematical analysis and simulation, the proposed DCS is proved to be effective in a highly mobile and hostile network environment. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:555 / 570
页数:16
相关论文
共 50 条
  • [21] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
  • [22] A novel intrusion detection method for mobile ad hoc networks
    Yi, P
    Zhong, YP
    Zhang, SY
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1183 - 1192
  • [23] A novel approach for intrusion detection in mobile ad hoc networks
    Chaudhari B.S.
    Prasad R.S.
    Int. J. Networking Virtual Organ., 2019, 3 (363-378): : 363 - 378
  • [24] Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
    Vaseer, Gurveen
    Ghai, Garima
    Ghai, Dhruva
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 35 - 39
  • [25] Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    Sen, Sevil
    Clark, John A.
    PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE, 2008, 5351 : 1053 - 1058
  • [26] Towards adaptive intrusion detection in Mobile Ad hoc Networks
    Sun, B
    Wu, K
    Pooch, UW
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 3551 - 3555
  • [27] On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
    Boppana, Rajendra V.
    Su, Xu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) : 1162 - 1174
  • [28] Intrusion Detection Systems in Mobile Ad Hoc Networks: A Survey
    Elboukhari, Mohamed
    Azizi, Mostafa
    Azizi, Abdelmalek
    2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), 2014, : 136 - 141
  • [29] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    F. Richard Yu
    Helen Tang
    Wireless Networks, 2010, 16 : 2169 - 2178
  • [30] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    WIRELESS NETWORKS, 2010, 16 (08) : 2169 - 2178