Location Estimation of an Intruder in Wireless Ad Hoc Networks

被引:0
|
作者
Debono, C. J. [1 ]
Sammut, E. [1 ]
机构
[1] Univ Malta, Dept Commun & Comp Engn, Msida 2080, Msd, Malta
来源
2008 IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1 AND 2 | 2008年
关键词
Genetic Algorithms; Intrusion detection; Location estimation; Wireless ad hoc networks;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security within wireless ad hoe networks is hard to achieve due to the vulnerabilities in the data transmission process and the continuously changing network topology. An intrusion detection system is therefore essential to exclude any malicious nodes from the network. Furthermore, localization of the intruder helps in avoiding further attacks from the same user on the system. This paper proposes the application of a genetic algorithm to estimate the location of such malicious nodes. Simulation results show that with nine anchor nodes in a I km by I km area, the algorithm is capable of estimating the intruder's position within a radius of 45 meters in 60% of the cases. Additionally, the accuracy of the algorithm improves as the number of anchor nodes increases.
引用
收藏
页码:152 / 156
页数:5
相关论文
共 50 条
  • [21] Statistical estimation of link availability and its impact on routing in wireless ad hoc networks
    McDonald, AB
    Znati, TF
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2004, 4 (04) : 331 - 349
  • [22] Route BER Estimation in Wireless Ad Hoc Networks exploiting Minimum Distance Routing
    Sanatkar, Mohammad Reza
    Natarajan, Balasubramaniam
    Mohammadi, Abbas
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 926 - 930
  • [23] On The Construction of Neural Networks via Wireless Ad Hoc Networks
    Wei, Zhiqing
    Guo, Zijun
    Ma, Jiteng
    Feng, Zhiyong
    2018 IEEE 87TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2018,
  • [24] Reliability Estimation in Mobile Ad hoc Networks
    Chadha, Ritu
    Poylisher, Alexander
    Serban, Constantin
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 189 - 192
  • [25] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [26] Lower Bounds on the Capacity of Wireless Ad Hoc Networks
    Zhang, Xue
    Gong, Haigang
    Liu, Ming
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 714 - 718
  • [27] Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
    Bhorkar, Abhijeet A.
    Naghshvar, Mohammad
    Javidi, Tara
    Rao, Bhaskar D.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (01) : 243 - 256
  • [28] On the Scope of Backbone Formation in Wireless Ad Hoc Networks
    Kumar, Santosh
    Singh, Awadhesh Kumar
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 212 - 218
  • [29] Selecting forwarding neighbors in wireless ad hoc networks
    Calinescu, G
    Mandoiu, II
    Wan, PJ
    Zelikovsky, AZ
    MOBILE NETWORKS & APPLICATIONS, 2004, 9 (02) : 101 - 111
  • [30] An evolutionary approach to routing in wireless ad hoc networks
    Sreenivas, Hiranmayi
    Ali, HeshamH.
    IASTED International Conference on Wireless Networks and Emerging Technologies, 2005, : 57 - 64