Skip to main content

Security through Collaboration in MANETs

  • Conference paper
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behavior such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative outlier detection algorithm for MANETs that factors in a nodes reputation. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Grubbs, F.: Procedures for Detecting Outlying Observations in Samples. Technometrics 11(1), 1–21 (1969)

    Article  Google Scholar 

  2. Barnett, V., Lewis, T.: Outliers in Statistical Data. John Wiley and Sons, New York (1994)

    MATH  Google Scholar 

  3. Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. In: Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, USA (May 2003)

    Google Scholar 

  4. Zhang, J., Zulkernine, M.: Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection. In: Proceedings of IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, pp. 2388–2393 (2006)

    Google Scholar 

  5. Ferdousi, Z., Maeda, A.: Unsupervised Outlier Detection in Time Series Data. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW 2006), Atlanta, GA, USA (April 2006)

    Google Scholar 

  6. Sheng, B., Li, Q., Mao, W., Jin, W.: Outlier Detection in Sensor Networks. In: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2007), Montreal, Quebec, Canada, pp. 219–228 (2007)

    Google Scholar 

  7. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp. 275–283 (2002)

    Google Scholar 

  8. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th International Conference on Mobile Computing and Networking (MobiCom), Atlanta, GA, USA, pp. 12–23 (2002)

    Google Scholar 

  9. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting black-hole attack in mobile ad hoc networks. In: Proceedings of 5th European Personal Mobile Communications Conference, Glasgow, Scotland, UK, pp. 490–495 (2003)

    Google Scholar 

  10. Ramaswamy, S., Rastogi, R., Shim, K.: Efficient Algorithms for Mining Outliers fromLarge Datasets. In: Proceedings of the 2000 ACM SIGMOD international Conference on Management of Data, Dallas, Texas, USA, pp. 427–438 (2000)

    Google Scholar 

  11. Anguilla, F., Pizzuti, C.: Fast Outlier Detection in High Dimensional Spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS, vol. 2431, pp. 15–26. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Knorr, E.M., Ng, R.T.: Algorithms for Mining Distance-Based Outliers in Large Datasets. In: Proceedings of the 24th international Conference on Very Large Data Bases (VLDB 1998), New York, USA, pp. 392–403 (1998)

    Google Scholar 

  13. Knorr, E.M., Ng, R.T.: Finding Intensional Knowledge of Distance-Based Outliers. In: Proceedings of the 25th international Conference on Very Large Data Bases (VLDB 1999), Edinburgh, Scotland, UK, pp. 211–222 (1999)

    Google Scholar 

  14. Bay, S.D., Schwabacher, M.: Mining Distance-based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule. In: Proceedings of the Ninth ACM SIGKDD international Conference on Knowledge Discovery and Data Mining (KDD 2003), Washington, D.C., USA, pp. 29–38 (2003)

    Google Scholar 

  15. Aggarwal, C., Yu, S.: An Effective and Efficient Algorithm for High-dimensional Outlier Detection. The VLDB Journal 14(2), 211–221 (2005)

    Article  Google Scholar 

  16. Aggarwal, C.C.: Re-designing Distance Functions and Distance-based Applications for High Dimensional Data. ACM SIGMOD Record 30(1), 13–18 (2001)

    Article  Google Scholar 

  17. Aggarwal, C.C., Yu, P.S.: Outlier Detection for High Dimensional Data. In: Proceedings of the 2001 ACM SIGMOD international Conference on Management of Data (SIGMOD 2001), Santa Barbara, California, USA, pp. 37–46 (2001)

    Google Scholar 

  18. Lazarevic, A., Kumar, V.: Feature Bagging for Outlier Detection. In: Proceeding of the Eleventh ACM SIGKDD international Conference on Knowledge Discovery in Data Mining (KDD 2005), Chicago, Illinois, USA, pp. 157–166 (2005)

    Google Scholar 

  19. Branch, J., Szymanski, B., Giannella, C., Wolff, R., Kargupta, H.: In-network Outlier Detection in Wireless Sensor Networks. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisbon, Portugal (2006)

    Google Scholar 

  20. Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Distributed Deviation Detection in Sensor Networks. ACM SIGMOD Record 32(4), 77–82 (2003)

    Article  Google Scholar 

  21. Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Online Outlier Detection in Sensor Data Using Non-parametric Models. In: Proceedings of the 32nd international Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea, pp. 187–198 (2006)

    Google Scholar 

  22. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, USA, pp. 255–265 (2000)

    Google Scholar 

  23. Liu, Y., Comaniciu, C., Man, H.: A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks. In: Proceeding of the 2006 Workshop on Game theory For Communications and Networks (GAMENET 2006), Pisa, Italy (2006)

    Google Scholar 

  24. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-hoc Networks. In: Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, USA, pp. 275–283 (2000)

    Google Scholar 

  25. Deng, H., Zeng, Q., Agrawal, D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC 2003), Orlando, FL, USA, vol. 3, pp. 2147–2151 (2003)

    Google Scholar 

  26. Kachirski, O., Guha, R.: Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. In: Proceedings of the IEEE Workshop on Knowledge Media Networking, Kyoto, Japan, pp. 153–158 (2002)

    Google Scholar 

  27. Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-based Intrusion Detection System for AODV. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN 2003), Fairfax, VA, USA, pp. 125–134 (2003)

    Google Scholar 

  28. Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax, VA, USA, pp. 135–147 (2003)

    Google Scholar 

  29. Kefayati, M., Rabiee, H.R., Miremadi, S.G., Khonsari, A.: Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, VA, USA, pp. 91–100 (2006)

    Google Scholar 

  30. Xue, Y., Nahrstedt, K.: Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments. Wireless Personal Communication 29(3-4), 367–388 (2004)

    Article  Google Scholar 

  31. Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: A Truthful and Cost-efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In: Proceedings of the 9th Annual international Conference on Mobile Computing and Networking (MOBICOM 2003), San Diego, CA, USA, pp. 245–259 (2003)

    Google Scholar 

  32. Glomosim 2.03, http://pcl.cs.ucla.edu/projects/glomosim/

  33. Parker, J., Patwardhan, A., Joshi, A.: Cross-layer Analysis for Detecting Wireless Misbehavior. In: Proceedings of the IEEE Consumer Communications and Networking Conference(CCNC 2006), Las Vegas, Nevada, USA (January 2006)

    Google Scholar 

  34. He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad hoc Networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), vol. 2, pp. 825–830 (2004)

    Google Scholar 

  35. Patwardhan, A., Perich, F., Joshi, A., Finin, T., Yesha, Y.: Active Collaborations for Trustworthy Data Management in Ad Hoc Networks. In: Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (November 2005)

    Google Scholar 

  36. Srinivasan, V., Nuggehalli, P., Chiasserini, C.-F., Rao, R.R.: An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Transactions on Wireless Communications 4(2), 722–733 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, W., Parker, J., Joshi, A. (2009). Security through Collaboration in MANETs. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics