Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory

dc.contributor.authorLi, Wenjia
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-11-19T19:15:51Z
dc.date.available2018-11-19T19:15:51Z
dc.date.issued2009-05-18
dc.description2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middlewareen_US
dc.description.abstractMobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes rely on either a predefined threshold, or a set of well-defined training data to build up the detection mechanism before effectively identifying the malicious peers. However, it is generally difficult to set appropriate thresholds, and collecting training datasets representative of an attack ahead of time is also problematic. We observe that the malicious peers generally demonstrate behavioral patterns different from all the other normal peers, and argue that outlier detection techniques can be used to detect malicious peers in ad hoc networks. A problem with this approach is combining evidence from potentially untrustworthy peers to detect the outliers. In this paper, an outlier detection algorithm is proposed that applies the Dempster-Shafer theory to combine observation results from multiple nodes because it can appropriately reflect uncertainty as well as unreliability of the observations. The simulation results show that the proposed scheme is highly resilient to attackers and it can converge stably to a common outlier view amongst distributed nodes with a limited communication overhead.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/5088926en_US
dc.format.extent10 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/M2057CW9K
dc.identifier.citationWenjia Li and Anupam Joshi, Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory, 10th International Conference on Mobile Data Management (MDM 2009), DOI: 10.1109/MDM.2009.22en_US
dc.identifier.uri10.1109/MDM.2009.22
dc.identifier.urihttp://hdl.handle.net/11603/12057
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 20XX IEEE
dc.subjectmaneten_US
dc.subjectmisbehavior detectionen_US
dc.subjectsecurityen_US
dc.subjectAd hoc networksen_US
dc.subjectPeer to peer computingen_US
dc.subjectDetection algorithmsen_US
dc.subjectMobile ad hoc networksen_US
dc.subjecttelecommunication computingen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleOutlier Detection in Ad Hoc Networks Using Dempster-Shafer Theoryen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
448.pdf
Size:
476.19 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: