A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs

被引:0
作者
Mutlu, Sureyya [1 ]
Yilmaz, Guray [1 ]
机构
[1] Turkish Air Force Acad, Comp Engn Dept, Istanbul, Turkey
来源
PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES | 2011年
关键词
Mobile Ad Hoc Networks; Trust Management; Intrusion Detection Systems;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile Ad Hoc Network (MANET) is a collection of nodes, which form an infastructureless topology. There is no central access point or centralized management. For their nature, MANETs present a number of unique problems for Intrusion Detection Systems (IDS). This paper introduces an intrusion detection framework for MANETs, which is based on trust relationship. In our proposed framework, intrusion detection system relies on local and global determination of attacks within network and carried out in a distributed fashion with cooperation among nodes. Trust in this manner is an important issue. The nodes watch suspicious activities of neighboring nodes. An intrusion detection alert message is disseminated throughout the network to report the anomaly. Reputation of intrusion detection alert messages is used for trust assessment. The proposed framework aims to utilize a distributed and cooperative trust based intrusion detection system to cope with the disadvantages drawn from mobility of nodes and the probability of selfishness, which are unique to MANETs.
引用
收藏
页码:292 / 298
页数:7
相关论文
共 25 条
[1]  
BRUTCH P, 2003, IEEE WORKSH SEC ASS
[2]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[3]   Dempster-Shafer theory for intrusion detection in ad hoc networks [J].
Chen, TM ;
Venkataramanan, V .
IEEE INTERNET COMPUTING, 2005, 9 (06) :35-41
[4]  
Hu JY, 2009, COMPUT COMMUN NETW S, P43, DOI 10.1007/978-1-84800-328-6_3
[5]  
Jacquet P, 2001, IEEE INMIC 2001: IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2001, PROCEEDINGS, P62, DOI 10.1109/INMIC.2001.995315
[6]  
Karchirski O., 2003, P 36 IEEE INT C SYST, P244
[7]   Detecting critical nodes for MANET Intrusion Detection Systems [J].
Karygiannis, A. ;
Antonakakis, E. ;
Apostolopoulos, A. .
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, :7-+
[8]  
Pathan K., 2009, ROUTING MOBILE AD HO, P63
[9]  
PERKINS C, 2000, AD HOC ON DEMAND DIS
[10]   Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers [J].
Perkins, C.E. ;
Bhagwat, P. .
Computer Communications Review, 1994, 24 (04)