Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Basomingera, Robert | - |
dc.contributor.author | Choi, Young June (researcherId=7406117220; isni=0000000405323933; orcid=https://orcid.org/0000-0003-2014-6587) | - |
dc.date.issued | 2020-11-01 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/31656 | - |
dc.description.abstract | Owing to ad hoc wireless networks’ properties, the implementation of complex security systems with higher computing resources seems troublesome in most situations. Therefore, the usage of anomaly or intrusion detection systems has attracted considerable attention. The detection systems are implemented either as host-based, run by each node; or as cluster/network-based, run by cluster head. These two implementations exhibit benefits and drawbacks, such as when cluster-based is used alone, it faces maintaining protection when nodes delay to elect or replace a cluster head. Despite different heuristic approaches that have been proposed, there is still room for improvement. This work proposes a detection system that can run either as host-or as cluster-based to detect routing misbehavior attacks. The detection runs on a dataset built using the proposed routing-information-sharing algorithms. The detection system learns from shared routing information and uses supervised learning, when previous network status or an exploratory network is available, to train the model, or it uses unsupervised learning. The testbed is extended to evaluate the effects of mobility and network size. The simulation results show promising performance even against limiting factors. | - |
dc.description.sponsorship | Funding: This research was supported by Korea Electric Power Corporation. [Grant number: 18A-013]. | - |
dc.language.iso | eng | - |
dc.publisher | MDPI AG | - |
dc.subject.mesh | Ad hoc wireless networks | - |
dc.subject.mesh | Computing resource | - |
dc.subject.mesh | Detection system | - |
dc.subject.mesh | Heuristic approach | - |
dc.subject.mesh | Intrusion Detection Systems | - |
dc.subject.mesh | Network status | - |
dc.subject.mesh | Routing information | - |
dc.subject.mesh | Routing misbehaviors | - |
dc.title | Learning from routing information for detecting routing misbehavior in ad hoc networks | - |
dc.type | Article | - |
dc.citation.endPage | 22 | - |
dc.citation.startPage | 1 | - |
dc.citation.title | Sensors (Switzerland) | - |
dc.citation.volume | 20 | - |
dc.identifier.bibliographicCitation | Sensors (Switzerland), Vol.20, pp.1-22 | - |
dc.identifier.doi | 10.3390/s20216275 | - |
dc.identifier.pmid | 33158143 | - |
dc.identifier.scopusid | 2-s2.0-85095723181 | - |
dc.identifier.url | https://www.mdpi.com/1424-8220/20/21/6275/pdf | - |
dc.subject.keyword | Ad hoc network | - |
dc.subject.keyword | Attack detection | - |
dc.subject.keyword | Data sharing algorithm | - |
dc.subject.keyword | Machine learning | - |
dc.description.isoa | true | - |
dc.subject.subarea | Analytical Chemistry | - |
dc.subject.subarea | Biochemistry | - |
dc.subject.subarea | Atomic and Molecular Physics, and Optics | - |
dc.subject.subarea | Instrumentation | - |
dc.subject.subarea | Electrical and Electronic Engineering | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.