Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks

被引:14
作者
Stafrace, Stefan K. [1 ]
Antonopoulos, Nick [1 ]
机构
[1] Univ Surrey, Sch Elect & Phys Sci, Dept Comp, Surrey GU2 7XH, England
关键词
Wireless ad hoc networks; Agent-based intrusion detection; Tactical agents; Military tactics; Security;
D O I
10.1016/j.comcom.2009.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Ad hoc Networks (WAHNs) offer a challenging environment for conventional Intrusion Detection Systems (IDSs). In particular WAHN have a dynamic topology, intermittent connectivity, resource constrained device nodes and possibly high node churn. Researchers over the past years have encouraged the use of agent-based IDS to overcome these challenges. In this work we propose the use of military tactics to optimise the operations of agent-based IDS for WAHN. We design an agent framework modeled over a military command structure and an agent behavioural model, which employs adapted military tactics to police routes, and detect intruders in the network. The tactical agents follow a risk-based approach such that the frequency of patrols is directly proportional to the risk factor of the route. Consequently, resources are conserved without impacting the effectiveness of he IDS. We demonstrate the proof of concept through a case study. In this study, we implement a simulation-based model of our solution to detect and recover from a Sinkhole attack in a Wireless Sensor Network (WSN), using the Ad hoc On Demand Distance Vector (AODV) as routing protocol. We evaluate the proof of concept in terms of the detection precision, data loss incurred from the attack and the agent overheads due to mobility and communication. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:619 / 638
页数:20
相关论文
共 26 条
[1]  
BALASUBRAMANIYA.J, 1998, 9805 PURD U DEP COMP
[2]  
BRAEM B, 2008, USING THREADING SUN
[3]  
ESTRIN D, 2004, IEEE COMPUTER SO AUG
[4]  
GORODETSKY V, 2007, MULTIAGENT PEER TO P, P260
[5]   Using mobile agents for intrusion detection in wireless ad hoc networks [J].
Hijazi, A ;
Nasser, N .
2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, :362-366
[6]  
Jansen W., 2002, COMPUTER COMMUNICATI, V25
[7]  
Kabiri Peyman., 2005, IJ Network Security, V1, P84
[8]   Intrusion detection using mobile agents in wireless ad hoc networks [J].
Kachirski, O ;
Guha, R .
IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, :153-158
[9]  
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[10]  
KRONTIRIS I, 2008, P ACM SECURECOMM