Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
A P2P intrusion detection system based on mobile agents
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
A Novel Peer-to-Peer Intrusion Detection System
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
A Comparison of Wireless Sensor Network Routing Protocols on an Experimental Testbed
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Volume 02
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Designing secure sensor networks
IEEE Wireless Communications
Intrusion detection with mobile agents
Computer Communications
Engineering Applications of Artificial Intelligence
Hi-index | 0.24 |
Wireless Ad hoc Networks (WAHNs) offer a challenging environment for conventional Intrusion Detection Systems (IDSs). In particular WAHN have a dynamic topology, intermittent connectivity, resource constrained device nodes and possibly high node churn. Researchers over the past years have encouraged the use of agent-based IDS to overcome these challenges. In this work we propose the use of military tactics to optimise the operations of agent-based IDS for WAHN. We design an agent framework modeled over a military command structure and an agent behavioural model, which employs adapted military tactics to police routes, and detect intruders in the network. The tactical agents follow a risk-based approach such that the frequency of patrols is directly proportional to the risk factor of the route. Consequently, resources are conserved without impacting the effectiveness of the IDS. We demonstrate the proof of concept through a case study. In this study, we implement a simulation-based model of our solution to detect and recover from a Sinkhole attack in a Wireless Sensor Network (WSN), using the Ad hoc On Demand Distance Vector (AODV) as routing protocol. We evaluate the proof of concept in terms of the detection precision, data loss incurred from the attack and the agent overheads due to mobility and communication.