Skip to main content
Erschienen in: Mobile Networks and Applications 3/2012

01.06.2012

Security Through Collaboration and Trust in MANETs

verfasst von: Wenjia Li, James Parker, Anupam Joshi

Erschienen in: Mobile Networks and Applications | Ausgabe 3/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behaviors such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative and trust-based outlier detection algorithm that factors in a node’s reputation for MANETs. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Wireless Network Security (Part II, Chapter 12), Springer Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Wireless Network Security (Part II, Chapter 12), Springer
2.
Zurück zum Zitat Zhang Y, Lee W (2002) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 275–283 Zhang Y, Lee W (2002) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 275–283
3.
Zurück zum Zitat Hu Y, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 12–23 Hu Y, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp 12–23
4.
Zurück zum Zitat Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting black-hole attack in mobile ad hoc networks. In Proceedings of 5th European Personal Mobile Communications Conference, Glasgow, Scotland, UK, pp 490–495 Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting black-hole attack in mobile ad hoc networks. In Proceedings of 5th European Personal Mobile Communications Conference, Glasgow, Scotland, UK, pp 490–495
5.
Zurück zum Zitat Grubbs F (1969) Procedures for detecting outlying observations in samples. Technometrics 11(1):1–21 Grubbs F (1969) Procedures for detecting outlying observations in samples. Technometrics 11(1):1–21
6.
Zurück zum Zitat Lazarevic A, Ertoz L, Ozgur A, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, USA, May Lazarevic A, Ertoz L, Ozgur A, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, USA, May
7.
Zurück zum Zitat Zhang J, Zulkernine M (2006) Anomaly based network intrusion detection with unsupervised outlier detection. In Proceedings of IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, pp 2388–2393 Zhang J, Zulkernine M (2006) Anomaly based network intrusion detection with unsupervised outlier detection. In Proceedings of IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, pp 2388–2393
8.
Zurück zum Zitat Ferdousi Z, Maeda A (2006) Unsupervised outlier detection in time series data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW06), Atlanta, GA, USA, Apr Ferdousi Z, Maeda A (2006) Unsupervised outlier detection in time series data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW06), Atlanta, GA, USA, Apr
9.
Zurück zum Zitat Sheng B, Li Q, Mao W, Jin W (2007) Outlier detection in sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc07), Montreal, Quebec, Canada, pp 219–228 Sheng B, Li Q, Mao W, Jin W (2007) Outlier detection in sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc07), Montreal, Quebec, Canada, pp 219–228
10.
Zurück zum Zitat Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large datasets. In Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data, Dallas, Texas, USA, pp 427–438 Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large datasets. In Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data, Dallas, Texas, USA, pp 427–438
11.
Zurück zum Zitat Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In Proceedings of the 24th international Conference on Very Large Data Bases (VLDB98), New York, NY, USA, pp 392–403 Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In Proceedings of the 24th international Conference on Very Large Data Bases (VLDB98), New York, NY, USA, pp 392–403
12.
Zurück zum Zitat Knorr EM, Ng RT (1999) Finding intensional knowledge of distance-based outliers. In Proceedings of the 25th international Conference on Very Large Data Bases (VLDB99), Edinburgh, Scotland, UK, pp 211–222 Knorr EM, Ng RT (1999) Finding intensional knowledge of distance-based outliers. In Proceedings of the 25th international Conference on Very Large Data Bases (VLDB99), Edinburgh, Scotland, UK, pp 211–222
13.
Zurück zum Zitat Li W, Parker J, Joshi A (2008) Security through collaboration in MANETs. In Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Springer LNICST vol. 10, Orlando, FL, USA, pp 696–714, November Li W, Parker J, Joshi A (2008) Security through collaboration in MANETs. In Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Springer LNICST vol. 10, Orlando, FL, USA, pp 696–714, November
14.
Zurück zum Zitat Li W, Joshi A (2009) Outlier detection in ad hoc networks using dempster-shafer theory. In Proceedings of the 10th International Conference on Mobile Data Management (MDM 2009), Taipei, Taiwan, pp 112–121, May Li W, Joshi A (2009) Outlier detection in ad hoc networks using dempster-shafer theory. In Proceedings of the 10th International Conference on Mobile Data Management (MDM 2009), Taipei, Taiwan, pp 112–121, May
15.
Zurück zum Zitat Li W, Joshi A, Finin T (2009) Policy-based malicious peer detection in ad hoc networks. In Proceedings of 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), Vancouver, Canada, Vol. 3, pp 76–82, August Li W, Joshi A, Finin T (2009) Policy-based malicious peer detection in ad hoc networks. In Proceedings of 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), Vancouver, Canada, Vol. 3, pp 76–82, August
16.
Zurück zum Zitat Branch J, Szymanski B, Giannella C, Wolff R, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS2006),Lisbon, Portugal Branch J, Szymanski B, Giannella C, Wolff R, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS2006),Lisbon, Portugal
17.
Zurück zum Zitat Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. ACM SIGMOD Record 32(4):77–82CrossRef Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. ACM SIGMOD Record 32(4):77–82CrossRef
18.
Zurück zum Zitat Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd international Conference on Very Large Data Bases (VLDB06), Seoul, Korea, pp 187–198 Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd international Conference on Very Large Data Bases (VLDB06), Seoul, Korea, pp 187–198
19.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 255–265
20.
Zurück zum Zitat Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceeding of the 2006 Workshop on Game theory For Communications and Networks (GAMENET06), Pisa, Italy Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceeding of the 2006 Workshop on Game theory For Communications and Networks (GAMENET06), Pisa, Italy
21.
Zurück zum Zitat Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 275–283 Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM00), Boston, MA, USA, pp 275–283
22.
Zurück zum Zitat DengH, Zeng Q, Agrawal DP (2003) SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC03), vol. 3, pp 2147–2151, Orlando, FL, USA DengH, Zeng Q, Agrawal DP (2003) SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC03), vol. 3, pp 2147–2151, Orlando, FL, USA
23.
Zurück zum Zitat Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pp 153–158, Kyoto, Japan Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pp 153–158, Kyoto, Japan
24.
Zurück zum Zitat Tseng C, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03), Fairfax, VA, USA, pp 125–134 Tseng C, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03), Fairfax, VA, USA, pp 125–134
25.
Zurück zum Zitat Huang Y, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), Fairfax, VA, USA, pp 135–147 Huang Y, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN03), Fairfax, VA, USA, pp 135–147
26.
Zurück zum Zitat Kefayati M, Rabiee HR, Miremadi SG, Khonsari A (2006) Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp 91–100 Kefayati M, Rabiee HR, Miremadi SG, Khonsari A (2006) Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06), Alexandria, VA, USA, pp 91–100
27.
Zurück zum Zitat Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp 245–259 Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp 245–259
29.
Zurück zum Zitat Parker J, Patwardhan A, Joshi A (2006) Cross-layer analysis for detecting wireless misbehavior. In Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006), Las Vegas, Nevada, USA, Jan Parker J, Patwardhan A, Joshi A (2006) Cross-layer analysis for detecting wireless misbehavior. In Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006), Las Vegas, Nevada, USA, Jan
30.
Zurück zum Zitat He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad hoc networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, pp 825–830 He Q, Wu D, Khosla P (2004) SORI: a secure and objective reputation-based incentive scheme for ad hoc networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, pp 825–830
31.
Zurück zum Zitat Patwardhan A, Perich F, Joshi A, Finin T, Yesha Y (2005) Active collaborations for trustworthy data management in ad hoc networks. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November Patwardhan A, Perich F, Joshi A, Finin T, Yesha Y (2005) Active collaborations for trustworthy data management in ad hoc networks. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November
32.
Zurück zum Zitat Srinivasan V, Nuggehalli P, Chiasserini C-F, Rao RR (2005) An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Trans Wireless Commun 4(2):722–733CrossRef Srinivasan V, Nuggehalli P, Chiasserini C-F, Rao RR (2005) An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Trans Wireless Commun 4(2):722–733CrossRef
33.
Zurück zum Zitat Buchegger S, Boudec J-YL (2003) A robust reputation system for mobile ad-hoc networks. In Proceedings of P2PEcon Buchegger S, Boudec J-YL (2003) A robust reputation system for mobile ad-hoc networks. In Proceedings of P2PEcon
34.
Zurück zum Zitat Griffiths N (2005) Task delegation using experience-based multi-dimensional trust. In Proceedings of the Fourth international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 05), pp 489–496, The Netherlands, July Griffiths N (2005) Task delegation using experience-based multi-dimensional trust. In Proceedings of the Fourth international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 05), pp 489–496, The Netherlands, July
35.
Zurück zum Zitat Reece S, Rogers A, Roberts S, Jennings NR (2007) Rumors and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In Proceedings of the 6th international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 07), pp 1–8, Honolulu, Hawaii, USA May Reece S, Rogers A, Roberts S, Jennings NR (2007) Rumors and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In Proceedings of the 6th international Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 07), pp 1–8, Honolulu, Hawaii, USA May
Metadaten
Titel
Security Through Collaboration and Trust in MANETs
verfasst von
Wenjia Li
James Parker
Anupam Joshi
Publikationsdatum
01.06.2012
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 3/2012
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-010-0243-9

Weitere Artikel der Ausgabe 3/2012

Mobile Networks and Applications 3/2012 Zur Ausgabe

Neuer Inhalt