A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Communications of the ACM - Supporting exploratory search
Security Considerations in Space and Delay Tolerant Networks
SMC-IT '06 Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology
Modelling mobility in disaster area scenarios
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
A hybrid data mining anomaly detection technique in ad hoc networks
International Journal of Wireless and Mobile Computing
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
A Partition-Tolerant Manycast Algorithm for Disaster Area Networks
SRDS '09 Proceedings of the 2009 28th IEEE International Symposium on Reliable Distributed Systems
An opportunistic authority evaluation scheme for data security in crisis management scenarios
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Modular anomaly detection for smartphone ad hoc communication
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Hi-index | 0.00 |
One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common operational picture and thereby reliable dissemination are prevalent. In this paper we address anomaly detection in intermittently connected mobile ad hoc networks in which there is little or no knowledge about the actors on the scene, and opportunistic contacts together with a store-and-forward mechanism are used to overcome temporary partitions. The approach uses a statistical method for detecting anomalies when running a manycast protocol for dissemination of important messages to k receivers. Simulation of the random walk gossip (RWG) protocol combined with detection and mitigation mechanisms is used to illustrate that resilience can be built into a network in a fully distributed and attack-agnostic manner, at a modest cost in terms of drop in delivery ratio and additional transmissions. The approach is evaluated with attacks by adversaries that behave in a similar manner to fair nodes when invoking protocol actions.