Intelligent mobile agents in large distributed autonomous cooperative systems
Journal of Systems and Software - Special issue on invited articles on top systems and software engineering scholars
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Network Processor (NP) is optimized to perform network tasks. It uses massive parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization, dynamically topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in the security of Ad hoc network. A novel NP-based trustworthy agent scheme is proposed to combat the attack. Trustworthy agent is established by a hardware thread in NP. Agent can update itself at some interval by the trustworthiness of the neighbor nodes. Agent can trace the RREQ and RREP messages stream to aggregate the key information and analyze them by intrusion detection algorithm. NS2 simulator is expanded to validate the security and trustworthy scheme. Simulation results show that NP-based trustworthy agent scheme is effective to detect DoS attacks.