Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
Direct measurement vs. indirect inference for determining network-internal delays
Performance Evaluation
Passive network tomography using Bayesian inference
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
MATA '00 Proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Self-organization in ad hoc sensor networks: an empirical study
ICAL 2003 Proceedings of the eighth international conference on Artificial life
Loss inference in wireless sensor networks based on data aggregation
Proceedings of the 3rd international symposium on Information processing in sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
MANET simulation studies: the incredibles
ACM SIGMOBILE Mobile Computing and Communications Review - Special Issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks.: The Digital Library version of this issue has a corrected special issue title compared to the one in the print version of the issue.
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
A Clock Synchronization Algorithm for Multihop Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Inference of Wireless Link Performance in MANET
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
Throughput-delay tradeoff in small and sparse mobile ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Local anomaly detection for mobile network monitoring
Information Sciences: an International Journal
A simple graphical approach for understanding probabilistic inference in Bayesian networks
Information Sciences: an International Journal
AdHoc probe: end-to-end capacity probing in wireless ad hoc networks
Wireless Networks
WMWA '09 Proceedings of the 2009 Second Pacific-Asia Conference on Web Mining and Web-based Application
A novel mobility model based on semi-random circular movement in mobile ad hoc networks
Information Sciences: an International Journal
Architecture for data collection in database intrusion detection systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
On improving temporal and spatial mobility metrics for wireless ad hoc networks
Information Sciences: an International Journal
IEEE Transactions on Signal Processing
Unicast-based inference of network link delay distributions with finite mixture models
IEEE Transactions on Signal Processing
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Information Sciences: an International Journal
Information Sciences: an International Journal
Hi-index | 0.07 |
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network (MANET) applications. Often, however, a highly secure mechanism consumes a large amount of network resources, resulting in network performance degradation. To shift intrusion detection from existing security-centric design approaches to network performance centric design schemes, this paper presents a framework for designing an energy-aware and self-adaptive anomaly detection scheme for resource constrained MANETs. The scheme uses network tomography, a new technique for studying internal link performance based solely on end-to-end measurements. With the support of a module comprising a novel spatial-time model to identify the MANET topology, an energy-aware algorithm to sponsor system service, a method based on the expectation maximum to infer delay distribution, and a Self-organizing Map (SOM) neural network solution to profile link activity, the proposed system is capable of detecting link anomalies and localizing malicious nodes. Consequently, the proposed scheme offers a trade-off between overall network security and network performance, without causing any heavy network overload. Moreover, it provides an additional approach to monitor the spatial-time behavior of MANETs, including network topology, link performance and network security. The effectiveness of the proposed schemes is verified through extensive experiments.