TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks

被引:0
|
作者
Deb, Novarun [1 ]
Chaki, Nabendu [1 ]
机构
[1] Univ Calcutta, Kolkata 700073, W Bengal, India
关键词
Greyhole attack; Denial of Service attack; RREQ packet; RREP packet; Trust Request packet;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to propose a new trust-based Intrusion Detection system (IDS) for wireless, ad-hoc networks with or without mobility of nodes. In fact, the proposed solution not only detects intrusions but also proactively responds towards route setup avoiding the compromised nodes. It could be extended for mesh or hybrid networking environment too. Trust is evaluated as the weighted sum of direct evaluation of the neighboring nodes as well as from the indirect references. A sliding window is defined on the time scale and the IDS is to be evoked after every time slice. Indirect reference is derived from the recommendations of those 1-hop neighbors of the target node that are also neighbors of the evaluating node. The performance of the proposed algorithm has been evaluated using the Qualnet network simulator. Simulation results also establish superiority of the proposed algorithm over HIDS, another recent trust-based IDS for wireless ad-hoc network.
引用
收藏
页码:80 / 91
页数:12
相关论文
共 50 条
  • [1] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [2] A Dynamic Monitoring for Energy Consumption Reduction of a Trust-Based Intrusion Detection System in Mobile Ad-hoc Networks
    Lupia, Andrea
    Marano, Salvatore
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2016,
  • [3] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [4] Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
    Di Wu 1 Zhisheng Liu 1 Yongxin Feng 2
    [J]. 计算机工程与应用, 2004, (29) : 122 - 125
  • [5] Intrusion Detection System for Wireless Ad-hoc network
    Chandravanshi, Kamlesh
    Tiwari, Akrosh
    Bathre, Mukesh
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 272 - +
  • [6] Trust-based Approaches to Solve Routing Issues in Ad-hoc Wireless Networks: A Survey
    Gonzalez, Jesus M.
    Anwar, Mohd
    Joshi, James B. D.
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 556 - 563
  • [7] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032
  • [8] Towards Trust-based Decentralized Ad-Hoc Social Networks
    Koidl, Kevin
    [J]. COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, : 1545 - 1551
  • [9] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [10] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,