Integration of mobility and intrusion detection for wireless ad hoc networks

被引:35
|
作者
Sun, Bo [1 ]
Wu, Kui
Xiao, Yang
Wang, Ruhai
机构
[1] Lamar Univ, Dept Comp Sci, Beaumont, TX 77710 USA
[2] Lamar Univ, Dept Elect Sci, Beaumont, TX 77710 USA
[3] Univ Victoria, Dept Comp Sci, Victoria, BC V8W 3P6, Canada
[4] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
关键词
intrusion detection; mobile ad hoc networks; mobility model;
D O I
10.1002/dac.853
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of the main challenges in building intrusion detection systems (IDSs) for mobile ad hoc networks (MANETs) is to integrate mobility impacts and to adjust the behaviour of IDSs correspondingly. In this paper, we first introduce two different approaches, a Markov chain-based approach and a Hotelling's T-2 test based approach, to construct local IDSs for MANETs. We then demonstrate that nodes' moving speed, a commonly used parameter in tuning IDS performances, is not an effective metric to tune IDS performances under different mobility models. To solve this problem, we further propose an adaptive scheme, in which suitable normal profiles and corresponding proper thresholds can be selected adaptively by each local IDS through periodically measuring its local link change rate, a proposed unified performance metric. We study the proposed adaptive mechanism at different mobility levels, using different mobility models such as random waypoint model, random drunken model, and obstacle mobility model. Simulation results show that our proposed adaptive scheme is less dependent on the underlying mobility models and can further reduce false positive ratio. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:695 / 721
页数:27
相关论文
共 50 条
  • [1] Intrusion detection in wireless ad hoc networks
    Mishra, A
    Nadkarni, K
    Patcha, A
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 48 - 60
  • [2] Intrusion detection techniques in wireless ad hoc networks
    Wang, Xia
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 347 - 349
  • [3] A novel intrusion detection approach for wireless ad hoc networks
    Nadkarni, K
    Mishra, A
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 831 - 836
  • [4] A Distributed Intrusion Detection System for Wireless Ad Hoc Networks
    Sen, Jaydip
    Ukil, Arijit
    Bera, Debasish
    Pal, Arpan
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 363 - 368
  • [5] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [6] An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks
    Sen, Jaydip
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 202 - 207
  • [7] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105
  • [8] Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
    Sun, Bo
    Osborne, Lawrence
    Xiao, Yang
    Guizani, Sghaier
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 56 - 63
  • [9] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    [J]. IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158
  • [10] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366