Location Estimation of an Intruder in Wireless Ad Hoc Networks

被引:0
|
作者
Debono, C. J. [1 ]
Sammut, E. [1 ]
机构
[1] Univ Malta, Dept Commun & Comp Engn, Msida 2080, Msd, Malta
来源
2008 IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1 AND 2 | 2008年
关键词
Genetic Algorithms; Intrusion detection; Location estimation; Wireless ad hoc networks;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security within wireless ad hoe networks is hard to achieve due to the vulnerabilities in the data transmission process and the continuously changing network topology. An intrusion detection system is therefore essential to exclude any malicious nodes from the network. Furthermore, localization of the intruder helps in avoiding further attacks from the same user on the system. This paper proposes the application of a genetic algorithm to estimate the location of such malicious nodes. Simulation results show that with nine anchor nodes in a I km by I km area, the algorithm is capable of estimating the intruder's position within a radius of 45 meters in 60% of the cases. Additionally, the accuracy of the algorithm improves as the number of anchor nodes increases.
引用
收藏
页码:152 / 156
页数:5
相关论文
共 50 条
  • [31] Multicasting with Localized Control in Wireless Ad Hoc Networks
    Peng, Jun
    Sikdar, Biplab
    Cheng, Liang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (01) : 52 - 64
  • [32] Neighbor Selection Game in Wireless Ad Hoc Networks
    Zarifzadeh, Sajjad
    Yazdani, Nasser
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (02) : 617 - 640
  • [33] Autoregressive Trust Management in Wireless Ad Hoc Networks
    Li, Xu
    Li, Zhi
    Stojmenovic, Milos
    Narasimhan, Venkat
    Nayak, Amiya
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) : 229 - 242
  • [34] Connectivity Analysis of Wireless Ad Hoc Networks With Beamforming
    Zhou, Xiangyun
    Durrani, Salman
    Jones, Haley M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (09) : 5247 - 5257
  • [35] Regional gossip routing for wireless ad hoc networks
    Li, XY
    Moaveninejad, K
    Frieder, O
    MOBILE NETWORKS & APPLICATIONS, 2005, 10 (1-2) : 61 - 77
  • [36] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [37] Leader election algorithms for wireless ad hoc networks
    Vasudevan, S
    DeCleene, B
    Immerman, N
    Kurose, J
    Towsley, D
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 261 - 272
  • [38] DEVS modeling of mobile wireless ad hoc networks
    Farooq, Urnar
    Wainer, Gabriel
    Balya, Bengu
    SIMULATION MODELLING PRACTICE AND THEORY, 2007, 15 (03) : 285 - 314
  • [39] Topology control in wireless ad hoc and sensor networks
    Santi, P
    ACM COMPUTING SURVEYS, 2005, 37 (02) : 164 - 194
  • [40] Probabilistic power management for wireless ad hoc networks
    Li, ZP
    Li, BC
    MOBILE NETWORKS & APPLICATIONS, 2005, 10 (05) : 771 - 782