KEYWORDS: Head, Radio propagation, Computer simulations, Probability theory, Detection and tracking algorithms, Algorithms, Fermium, Network security, Information science, Statistical analysis
On the basis of the analysis of clustering algorithm that had been proposed for MANET, a novel clustering strategy was
proposed in this paper. With the trust defined by statistical hypothesis in probability theory and the cluster head selected
by node trust and node mobility, this strategy can realize the function of the malicious nodes detection which was
neglected by other clustering algorithms and overcome the deficiency of being incapable of implementing the relative
mobility metric of corresponding nodes in the MOBIC algorithm caused by the fact that the receiving power of two
consecutive HELLO packet cannot be measured. It's an effective solution to cluster MANET securely.
KEYWORDS: Computer intrusion detection, Detection and tracking algorithms, Network security, Data communications, Networks, Information security, Data processing, Computer security, Telecommunications, Mobile communications
Ad hoc networks do not depend on any predefined infrastructure or centralized administration to operate. Their security characters require more complex security preventions. As the second line of defense, Intrusion detection is the necessary means of getting the high survivability. In this paper the security characters of ad hoc networks and the related contents of intrusion detection are discussed. Mobile Agent and Multi-layer Integrated Distributed Intrusion Detection Model (MAMIDIDM) and a heuristic global detection algorithm are proposed tentatively by combining the mobile agent technology with the multi-layer conception. This heuristic global detection algorithm combines the mobile agent detection engine with the multi-layer detection engines and analyzes the results obtained by the corresponding detection engines. MAMIDIDM has the better flexibility and extensibility, can execute the intrusion detection in clustering ad hoc networks effectively.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.