Outlier Detection using Naive Bayes in Wireless Ad Hoc Networks

被引:0
|
作者
Ren, Yonglin [1 ]
Pazzi, Richard W. [1 ]
Boukerche, Azzedine [1 ]
机构
[1] Univ Ottawa, SITE, PARADISE Res Lab, Ottawa, ON, Canada
来源
DIVANET 11: PROCEEDINGS OF THE FIRST ACM INTERNATIONAL SYMPOSIUM ON DESIGN AND ANALYSIS OF INTELLIGENT VEHICULAR NETWORKS AND APPLICATIONS | 2011年
关键词
Wireless Security; Outlier Detection; Naive Bayes Classifier; Trust Evaluation; Wireless Networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, security is one of the most significant concerns when constructing a flexible and improvisational network. For a wireless ad hoc network, which is exposed to an open and cooperative environment, its vulnerability needs a more effective protection for the validation of information sharing, when compared to traditional networks. At present, trust gains extensive attention as it is regarded as a well-known distributed management method to perceive abnormal behavior of other nodes. In this paper, we emphasize the importance of node cooperation, especially for the sharing of trust information. Thereby, an outlier detection scheme is presented based on Naive Bayes algorithm, which is used to predict the reliability of trust information provided by other adjacent nodes. We examine the scheme based on our design criteria and attack models. Through the security analysis, Naive Bayes makes the trust-based outlier detection more suitable and reliable for distributed networks.
引用
收藏
页码:109 / 115
页数:7
相关论文
共 50 条
  • [31] OPTIMIZING COST AND THROUHPUT EFFICIENCY WITH SECURITY IN WIRELESS AD HOC NETWORKS USING LEACH
    Menaka, R.
    Umamaheswari, N.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 1586 - 1591
  • [32] In-network outlier detection in wireless sensor networks
    Branch, Joel W.
    Giannella, Chris
    Szymanski, Boleslaw
    Wolff, Ran
    Kargupta, Hillol
    KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (01) : 23 - 54
  • [33] kth Order Geometric Spanners for Wireless Ad Hoc Networks
    Kiran, Prabhat
    Rao, S. V.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2011, 6536 : 197 - 208
  • [34] Fake News Detection Using Naive Bayes Classifier
    Granik, Mykhailo
    Mesyura, Volodymyr
    2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), 2017, : 900 - 903
  • [35] Twitter Spam Detection Using Naive Bayes Classifier
    Santoshi, K. Ushasree
    Bhavya, S. Sree
    Sri, Y. Bhavya
    Venkateswarlu, B.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 773 - 777
  • [36] Localized Delaunay triangulation with application in Ad Hoc wireless networks
    Li, XY
    Calinescu, G
    Wan, PJ
    Wang, Y
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2003, 14 (10) : 1035 - 1047
  • [37] Node mobility and capacity in wireless controllable ad hoc networks
    Seol, Jae-Young
    Kim, Seong-Lyun
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1345 - 1354
  • [38] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243): : 238 - 243
  • [39] On the Connectivity of Circularly Distributed Nodes in Ad Hoc Wireless Networks
    Misra, Ankit
    Teltia, Gaurav
    Chaturvedi, A. K.
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 717 - 719
  • [40] Performance evaluation of routing protocols for ad hoc wireless networks
    Boukerche, A
    MOBILE NETWORKS & APPLICATIONS, 2004, 9 (04) : 333 - 342