Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation

被引:0
|
作者
Lin, T. [1 ,2 ]
Wu, P. [1 ,3 ]
Gao, F. M. [2 ]
Wu, T. S. [4 ]
机构
[1] Chongqing Univ, Sch Automat, Chongqing 400044, Peoples R China
[2] Chongqing Coll Elect Engn, Chongqing 401331, Peoples R China
[3] Chongqing Chuanyi Automat Co Ltd, Chongqing 401121, Peoples R China
[4] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Mobile ad hoc network (MANET); intrusion detection; reputation mechanism; node reputation; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to the high mobility of nodes, the weakness of transmission media and the absence of central node. To overcome the vulnerability, this paper mainly studies the way to detect selfish nodes in the MANET, and thus prevent network intrusion. Specifically, a data-driven reputation evaluation model was proposed to detect selfish nodes using a new reputation mechanism. The mechanism consists of a monitoring module, a reputation evaluation module, penalty module and a response module. The MANET integrated with our reputation mechanism was compared with the traditional MANET through simulation. The results show that the addition of reputation mechanism can suppress the selfish behavior of network nodes and enhance network security.
引用
收藏
页码:660 / 671
页数:12
相关论文
共 50 条
  • [1] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    [J]. MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [2] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [3] On intrusion detection and response for mobile ad hoc networks
    Parker, J
    Undercoffer, J
    Pinkston, J
    Joshi, A
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 747 - 752
  • [4] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [5] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [6] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859
  • [7] Mobile agents-based intrusion detection system for mobile ad hoc networks
    Li, Yinan
    Qian, Zhihong
    [J]. 2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 145 - 148
  • [8] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    F. Richard Yu
    Helen Tang
    [J]. Wireless Networks, 2010, 16 : 2169 - 2178
  • [9] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    [J]. WIRELESS NETWORKS, 2010, 16 (08) : 2169 - 2178
  • [10] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes
    Mamatha, S.
    Damodaram, A.
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256