Yang XIAO, Lei BAI, Xian WANG. Friends mechanism-based routing intrusion detection model for mobile ad hoc network[J]. Journal on Communications, 2015, 36(Z1): 203-214.
DOI:
Yang XIAO, Lei BAI, Xian WANG. Friends mechanism-based routing intrusion detection model for mobile ad hoc network[J]. Journal on Communications, 2015, 36(Z1): 203-214. DOI: 10.11959/j.issn.1000-436x.2015301.
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
The proposed model mainly focused on how to effectively detect routing invasions from mobile ad hoc network as well as how to accurately respond to the malicious nodes
providing a trusted routing environment.A lightweight intrusion detection model was proposed to based on the friends mechanism
taking black hole attack for example
the OPNET software gives the simulation test
and results show that the schemes can effectively detect attacks
it is validated and compared with other conventional models.
关键词
Keywords
references
YANG C T , et al . A specification-based intrusion detection system for AODV [A ] . Proc of the ACM Workshop on security of Ad Hoc and SensorNetworks [C ] . 2003 . 125 - 134 .
HUANG Y , FAN W , LEE W , et al . Cross-featurea nalysisf or detecting ad-hoc routing anomalies [A ] . Proceedings of the 23rd Intemational Conference On Distributed Computing Systems [C ] . 2003 . 478 - 487 .
SRINIVASARAO G , KUMAR S S . An Efficient Intrusion Detection System in Mobile Ad hoc Networks [A ] . Lecture Notes in Electrical Engineering 151 [C ] . 2013 .
KULKARNI P . Design of hierarchical intrusion detection unit for ad hoc networks based on bayesian networks [M ] . Dissertations & These grad works , 2008 .
PERRIG A , ZAPATA , JOHNSON D B . Ariadne:a secure on-demand routing protocol for ad hoc networks [A ] . Mobile Computing and Networking ACM [C ] . 2002 . 12 - 23 .
JOHN C E . Fast training of support vector machines using sequential minimal optimization [M ] . Advances in Kernel Methods Support Vector Learning,Cambridge,MA,M/T Press , 1999 : 185 - 208 .
KEERTHI S S , SHEVADE S K , BHATTACHARYYA C , et al . Improvements to Platt’s SM4 algorithm for SVM classifier design [D ] . Dept.of O Mechanical and Production Engineering,National University of Singapore , 1999 .
JOACHIMS T . Making Large-Scale SVM Learning Practical [R ] . LS8Report,University of Dortmund , 1998 .
CHANG C C , LIN C J . LIBSVM:a library for support vector machines [EB/OL ] . http://www.csie.ntu.edu.tw/.rcjlinhibsvm http://www.csie.ntu.edu.tw/.rcjlinhibsvm , 2001 .
MILGRAM S . The small world problem [J ] . Psychology Today , 1967 ,( 5 ): 60 - 67 .
HELMY A . Small worlds in wireless networks [J ] . IEEE Communications Letters , 2003 , 7 ( 10 ): 490 - 492 .
CAPKUN S , HUBAUX J P , BUTTYAN L . Mobility helps security in ad hoc networks [A ] . Proc of MobiHoc’03,Annapolis [C ] . 2003 . 45 - 56 .
PEI W D , CHEN Z Q , YUAN Z Z . Friends-help mechanism for generating a class of scale-free networks [J ] . Journal of Jilin University (Information Science Edition) 2007 , 25 ( 4 ): 371 - 378 .
MA C E SHI H S . Security model and mathematical analysis of mobile ad hoc network [J ] . Chinese Journal of Sensors and Actuators , 2006 , 19 ( 4 ): 1305 - 1309 .
RAGHAVAN B , SNOEREN A C . Priority forwarding in ad hoc networks with self-interested parties [A ] . Workshop on Economics of Peer-to-Peer Systems [C ] . Berkeley,USA,May , 2003 .
MIRANDA H , RODRIGUES L . Friends and foes:preventing selfishness in open mobile ad hoc networks [A ] . Proc of the First International Workshop on Mobile Distributed Computing (MDC’03) [C ] . USA , 2003 .
VAPNIK V N . The nature of statistical learning theory [A ] . Series:Information Science and Statistics [C ] . 1996 .
RAZAK S A , FURNELL S , CLARKE N , et al . A two-tier intrusion detection system for mobile ad hoc networks–a friend approach [A ] . Intelligence and Security Informatics [C ] . Springer Berlin Heidelberg , 2006 . 590 - 595 .
DENG H M , ZENG Q A , AGRAWAL D P . SVM-based intrusion detection system for wireless ad hoc networks [A ] . Vehicular Technology Conference [C ] . 2003 .
WANG X ; WONG J S , STANLEY F , BASU S . Cross-layer based anomaly detection in wireless mesh networks [A ] . Ninth Annual International Symposium on Applications and the Internet [C ] . 2009 . 20 - 24 .