Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Algorithms for Mining Distance-Based Outliers in Large Datasets
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Finding Intensional Knowledge of Distance-Based Outliers
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
Proceedings of the 9th annual international conference on Mobile computing and networking
Distributed deviation detection in sensor networks
ACM SIGMOD Record
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Task delegation using experience-based multi-dimensional trust
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Unsupervised Outlier Detection in Time Series Data
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
In-Network Outlier Detection in Wireless Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Online outlier detection in sensor data using non-parametric models
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Outlier detection in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Policy-Based Malicious Peer Detection in Ad Hoc Networks
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
An analytical approach to the study of cooperation in wireless ad hoc networks
IEEE Transactions on Wireless Communications
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behaviors such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative and trust-based outlier detection algorithm that factors in a node's reputation for MANETs. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.