A ferry-based intrusion detection scheme for sparsely connected ad hoc networks

被引:0
|
作者
Chuah, A. [1 ]
Yang, P. [1 ]
Han, J. [1 ]
机构
[1] Lehigh Univ, Dept Comp Sci & Engn, Bethlehem, PA 18015 USA
关键词
intrusion detection; routing; prophet; DoS resilience; sparsely connected adhoc networks; disruption tolerant networks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. In addition, new history based routing schemes e.g. Prophet have been proposed because traditional adhoc routing schemes do not work well in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM) scheme for sparsely connected ad hoc networks that use Prophet as their routing scheme. Via simulations, we study the effectiveness of the FBIDM scheme when malicious nodes launch selective data dropping attacks. Our results with different mobility models, ferry speed, traffic load scenarios indicate that the FBIDM scheme is promising in reducing the impact of such malicious attacks.
引用
收藏
页码:525 / 532
页数:8
相关论文
共 50 条
  • [1] Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
    Chuah, M.
    Yang, P.
    MILCOM 2006, VOLS 1-7, 2006, : 3575 - +
  • [2] A scheme for intrusion detection and response in ad hoc networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 507 - +
  • [3] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [4] Agent based intrusion tolerance scheme in ad hoc networks
    Kim, KJ
    Hong, SO
    Chang, TM
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 324 - 329
  • [5] Role-based multicast in highly mobile but sparsely connected ad hoc networks
    Briesemeister, L
    Hommel, G
    MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, 2000, : 45 - 50
  • [6] Statistical Analysis Based Efficient Decentralized Intrusion Detection Scheme for Mobile Ad Hoc Networks
    Agarwal, Parul
    Yadav, Brijesh Singh
    Chandra, Joydeep
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 229 - +
  • [7] An intrusion detection method based on DBN in ad hoc networks
    Tan, Qiu-shi
    Huang, Wei
    Li, Qiang
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 477 - 485
  • [8] An Analysis of Monitoring Based Intrusion Detection for Ad Hoc Networks
    Boppana, Rajendra V.
    Su, Xu
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [9] Intrusion detection based timed automata for Ad hoc networks
    Yi, Ping
    Liu, Ning
    Wu, Yue
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (10): : 2310 - 2315
  • [10] A key management scheme combined with intrusion detection for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Luan, Liangyu
    Li, Guorui
    Rong, Wang
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 584 - +