An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks

نویسنده

  • Shiau-Huey Wang
چکیده

Numerous Intrusion Detection Systems (IDSs) have been developed for MANETs; however, comparatively little research focuses on intrusion alarm exchange and validation in Mobile Ad Hoc Networks (MANETs). We provide a secure alarm exchange framework for proactive MANET routing protocols and use Optimized Link State Routing model (OLSR) for the implementation. In our solution, alarms can be aggregated at a group coordinator for advanced alarm verification and reduction. This model can solve two major challenges in MANETs: lack of a centralized authority and dynamic topology caused by mobility. Furthermore, it also provides the foundations for local and global alarm validations. Unnecessary responses to false or forged alarms can be prevented if intrusion alarms are proved to be authentic and accurate. Our model selects the node with the best connectivity as the temporary centralized node for collecting all local alarms. Subsequently, it utilizes majority-voting strategy to detect false alarms. After false alarm reduction, an accurate local alarm is broadcast as a global alarm for notifying the entire network of the attacker existence. This model has the advantages of alarm reduction and low time overhead. The experimental results demonstrate that our solution is scalable and is not influenced by mobility. Extra alarm exchange and verification messages cause low time and message overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013