scispace - formally typeset
Search or ask a question

A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks

01 Jan 2018-
TL;DR: The following lists the main characters from the film version of The God of Small Things, which was released in cinemas around the world in 2016.
Abstract: Error! Bookmark not defined. List of Tables vii List of Figures viii

Content maybe subject to copyright    Report

Citations
More filters
Dissertation
01 Jan 2000

38 citations

Posted Content
TL;DR: Routing protocol, challenges and security of Ad-Hoc networks, a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration, are discussed.
Abstract: Mobile Ad-Hoc networks are a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration. Ad collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The infrastructure less and the dynamic nature of these networks demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies. People and devices are allowed to seamlessly internetwork in areas with no pre communication infrastructure, e.g., disaster recovery environments. Routing in Mobile Ad-Hoc Networks is a challenging task due to its frequent changes in topologies. We discuss in this paper routing protocol, challenges and security of Ad-Hoc networks.

22 citations

References
More filters
Book
01 Jan 1976
TL;DR: This book develops an alternative to the additive set functions and the rule of conditioning of the Bayesian theory: set functions that need only be what Choquet called "monotone of order of infinity." and Dempster's rule for combining such set functions.
Abstract: Both in science and in practical affairs we reason by combining facts only inconclusively supported by evidence. Building on an abstract understanding of this process of combination, this book constructs a new theory of epistemic probability. The theory draws on the work of A. P. Dempster but diverges from Depster's viewpoint by identifying his "lower probabilities" as epistemic probabilities and taking his rule for combining "upper and lower probabilities" as fundamental. The book opens with a critique of the well-known Bayesian theory of epistemic probability. It then proceeds to develop an alternative to the additive set functions and the rule of conditioning of the Bayesian theory: set functions that need only be what Choquet called "monotone of order of infinity." and Dempster's rule for combining such set functions. This rule, together with the idea of "weights of evidence," leads to both an extensive new theory and a better understanding of the Bayesian theory. The book concludes with a brief treatment of statistical inference and a discussion of the limitations of epistemic probability. Appendices contain mathematical proofs, which are relatively elementary and seldom depend on mathematics more advanced that the binomial theorem.

14,565 citations


"A Novel Cooperative Intrusion Detec..." refers background or methods in this paper

  • ...Weight is defined as the strength of evidence in supporting a hypothesis (Shafer, 1976)....

    [...]

  • ...decreasing the number of false positives, Dempster-Shafer theory (DST) of evidence (Shafer, 1976) was utilized....

    [...]

  • ...Let Ω be the frame of discernment which represents a set of mutually exclusive possibilities (Shafer, 1976)....

    [...]

  • ...Let Ω be the frame of discernment, which represents a set of mutually exclusive possibilities (Shafer, 1976)....

    [...]

  • ...Based on the collected observations from Nodes (A), (B), and (C), we apply Dempster’s rule of combination (Shafer, 1976) to combine the observations of all three nodes....

    [...]

Journal ArticleDOI
TL;DR: Routing protocols for ad hoc networks are examined by providing an overview of eight different protocols by presenting their characteristics and functionality, and then a comparison and discussion of their respective merits and drawbacks are provided.
Abstract: An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This article examines routing protocols for ad hoc networks and evaluates these protocols based on a given set of parameters. The article provides an overview of eight different protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.

4,278 citations


"A Novel Cooperative Intrusion Detec..." refers background in this paper

  • ...This delay is determined through a mechanism that keeps track of settling times for routes, which are defined as the times when routes to a destination fluctuate before the route with the best metric is received (Royer & Toh, 1999)....

    [...]

  • ...The process continues until the destination or an intermediate node with a recent route to the destination is found (Royer & Toh, 1999)....

    [...]

  • ...However, if a node receives two updates with the same sequence number, it selects the one with the smaller hop count to the destination (Royer & Toh, 1999)....

    [...]

  • ...Such messages are used by AODV as periodical local broadcasts to keep nodes informed about others in their neighborhood (Royer & Toh, 1999)....

    [...]

Journal ArticleDOI
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Abstract: Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework.

2,661 citations


"A Novel Cooperative Intrusion Detec..." refers background in this paper

  • ...At the same time, having a single, central authority can cause major vulnerabilities; if such a node gets compromised, the entire network is sabotaged (Zhou & Haas, 1999)....

    [...]

  • ...Security is a significant consideration in MANETs, especially for those applications involving highly secretive information, such as military operations (Zhou & Haas, 1999)....

    [...]

  • ...This lack of physical protection raises the chances for a network to get compromised (Zhou & Haas, 1999)....

    [...]

Journal ArticleDOI
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.

1,712 citations

Journal ArticleDOI
01 Jul 2003
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Abstract: Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANETs characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future. � 2003 Elsevier B.V. All rights reserved.

1,430 citations


"A Novel Cooperative Intrusion Detec..." refers background in this paper

  • ...…characteristics of MANETs that differentiate them from other types of wireless networking can be summarized by the following (Corson et al., 1999; Chlamtac et al, 2003; Johansson, 1999): • Dynamic Topologies: since nodes in MANETs are free to move arbitrarily and route changes, frequent network…...

    [...]

  • ...Such disruptions can be in the form of fabricating false routing messages, modifying original routing information, or impersonating other nodes (Chlamtac et al., 2003)....

    [...]

  • ...This makes the enforcement of cooperation among nodes an essential requirement for a MANET to remain operational (Chlamtac et al., 2003)....

    [...]

  • ...nodes act selfishly by not forwarding packets to conserve their resources (Chlamtac et al., 2003)....

    [...]