TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks

被引:0
|
作者
Deb, Novarun [1 ]
Chaki, Nabendu [1 ]
机构
[1] Univ Calcutta, Kolkata 700073, W Bengal, India
关键词
Greyhole attack; Denial of Service attack; RREQ packet; RREP packet; Trust Request packet;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to propose a new trust-based Intrusion Detection system (IDS) for wireless, ad-hoc networks with or without mobility of nodes. In fact, the proposed solution not only detects intrusions but also proactively responds towards route setup avoiding the compromised nodes. It could be extended for mesh or hybrid networking environment too. Trust is evaluated as the weighted sum of direct evaluation of the neighboring nodes as well as from the indirect references. A sliding window is defined on the time scale and the IDS is to be evoked after every time slice. Indirect reference is derived from the recommendations of those 1-hop neighbors of the target node that are also neighbors of the evaluating node. The performance of the proposed algorithm has been evaluated using the Qualnet network simulator. Simulation results also establish superiority of the proposed algorithm over HIDS, another recent trust-based IDS for wireless ad-hoc network.
引用
收藏
页码:80 / 91
页数:12
相关论文
共 50 条
  • [41] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [42] Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
    Vetrichelvi
    Rajaram
    Vanitha
    Mohankumar, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 215 - 219
  • [43] Intrusion detection using mobile agent in ad-hoc networks
    Xia, Y
    Li, RF
    Li, KL
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3383 - 3388
  • [44] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [45] Wormhole detection method based on location in wireless ad-hoc networks
    Lee, Kyuho
    Jeon, Hyojin
    Kim, Dongkyoo
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 361 - 372
  • [46] Multicasting with multiuser detection in ad-hoc wireless networks
    Sankaran, Chandrasekar
    Ephremides, Anthony
    [J]. International Zurich Seminar on Digital Communications, 2000, : 47 - 54
  • [47] Fault detection for vehicular ad-hoc wireless networks
    Worrall, Stewart
    Agamennoni, Gabriel
    Ward, James
    Nebot, Eduardo
    [J]. 2013 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV), 2013, : 298 - 303
  • [48] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [49] Byzantine Failure Detection in Wireless Ad-Hoc Networks
    Sota, Norihiro
    Higaki, Hiroaki
    [J]. 2015 36TH IEEE SARNOFF SYMPOSIUM, 2015, : 173 - 178
  • [50] An auction based Task Allocation Scheme for Power-Aware Intrusion Detection in Wireless Ad-Hoc Networks
    Srinivasan, T.
    Vijaykumar, Vivek
    Chandrasekar, R.
    [J]. 2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 200 - +