A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks

نویسندگان

چکیده

To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation sophisticated mechanism requires large number network resources that degrade performance. In addition, routing protocols designed for MANETs should be energy efficient order to maximize line with this view, work proposes new hybrid method called data-driven zone-based protocol (DD-ZRP) resource-constrained incorporate anomaly schemes awareness using Network Simulator 3. Most existing use constant threshold values, which leads false positive issues network. DD-ZRP uses dynamic detect anomalies MANETs. simulation results show an improved ratio performance over schemes; is substantially better than prevailing respect enhancement, efficiency, optimization available resources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

adaptive ordered weighted averaging for anomaly detection in cluster-based mobile ad hoc networks

in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...

متن کامل

A Novel Optimized Clustering Scheme for Mobile Ad-hoc Networks

In a Mobile Ad-Hoc Network (MANET) hosts communicate with each other without any centralized control. Due to various constraints like scarcity of resources, excessive routing overhead etc, the cluster routing protocol in MANETs becomes less reliable. In this paper, we present an efficient algorithm for cluster formation and selection of optimal clusterhead and thus forming the optimal cluster t...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks

Due to their unique characteristics, such as the dynamic changing topology, the absence of central management, the cooperative routing mechanisms, and the resources constraints, Mobile ad hoc networks (MANETs) are relatively vulnerable to both active and passive attacks. In MANET, routing attacks try to disrupt the functions of routing protocol by intentionally or unintentionally dropping packe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2021

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics10141635