DocumentCode :
2120353
Title :
Detecting critical nodes for MANET intrusion detection systems
Author :
Karygiannis, A. ; Antonakakis, E. ; Apostolopoulos, A.
Author_Institution :
National Inst. of Stand. & Technol., Gaithersburg, MD
fYear :
2006
fDate :
29-29 June 2006
Lastpage :
15
Abstract :
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, and hybrid ad hoc routing protocols is to faithfully route packets from a source node to a destination node while maintaining a satisfactory level of service in a resource-constrained environment. Detecting malicious nodes in an open ad hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad hoc network does not have these types of network elements where the intrusion detection system (IDS) can collect and analyze audit data for the entire network. A number of neighbor-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad hoc networks. The resources consumed by ad hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. This paper presents a method for determining conditions under which critical nodes should be monitored, describes the details of a critical node test implementation, presents experimental results, and offers a new approach for conserving the limited resources of an ad hoc network IDS
Keywords :
ad hoc networks; mobile communication; routing protocols; security of data; telecommunication security; MANET intrusion detection systems; ad hoc routing protocols; critical node detection; mobile ad hoc network; Ad hoc networks; Data security; Face detection; Intrusion detection; Mobile ad hoc networks; Monitoring; Network topology; Routing protocols; Switches; Telecommunication traffic; IDS; MANET; edge-cut; intrusion detection; mobile ad hoc network; security; vertex-cut.;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on
Conference_Location :
Lyon
Print_ISBN :
0-7695-2549-0
Type :
conf
DOI :
10.1109/SECPERU.2006.8
Filename :
1644271
Link To Document :
بازگشت