LSTF: a new scheduling policy for complex real-time tasks in multiple processor systems
Automatica (Journal of IFAC)
Ad hoc networking: an introduction
Ad hoc networking
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An Efficient Method for Optimal Probe Deployment of Distributed IDS
IEICE - Transactions on Information and Systems
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network
CISIM '07 Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications
Evaluation of classification algorithms for intrusion detection in MANETs
Knowledge-Based Systems
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
Hi-index | 0.24 |
Due to the ad hoc and mobile nature of a MANET, it is much more vulnerable to attacks than a wired network. As a result, there has been a significant research focusing on designing an Intrusion Detection System (IDS) for MANETs to detect anomalous behavior and misuse. However, each mobile node in a MANET typically has limited energy and thus it is not efficient to perform IDS functions within a node to detect every incoming packet. There is a need for an IDS to implement an intelligent control mechanism in order to monitor and recognize security breach attempts efficiently over a period of the expected network lifetime. By leveraging the Network Node Intrusion Detection (NNID) strategy, we developed a context adaptive IDS controller that advises an IDS to carry out intrusion detection while being prepared for a possible ''cut through'' if it is likely that the residual energy is not sufficient. By being embedded with the context adaptive IDS controller, the proposed Context Adaptive Intrusion Detection System (CAIDS) is able to adapt to the current node context (such as residual energy, security threats and traffic loading) for accommodating and inspecting new arriving packets. The performance is evaluated using a reward function that discovers an effective way to perform intrusion detection and delivers security benefits while meeting the energy budget. The numerical results show that CAIDS offers a good trade-off between lifetime performance and security. This study demonstrates empirically that the CAIDS model intelligently monitors and recognizes security breach attempts while adhering to the resource budget plan over the period of expected network lifetime.