Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory

dc.contributor.authorLi, Wenjia
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-11-19T19:15:51Z
dc.date.available2018-11-19T19:15:51Z
dc.date.issued2009-05-18
dc.description2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middlewareen
dc.description.abstractMobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes rely on either a predefined threshold, or a set of well-defined training data to build up the detection mechanism before effectively identifying the malicious peers. However, it is generally difficult to set appropriate thresholds, and collecting training datasets representative of an attack ahead of time is also problematic. We observe that the malicious peers generally demonstrate behavioral patterns different from all the other normal peers, and argue that outlier detection techniques can be used to detect malicious peers in ad hoc networks. A problem with this approach is combining evidence from potentially untrustworthy peers to detect the outliers. In this paper, an outlier detection algorithm is proposed that applies the Dempster-Shafer theory to combine observation results from multiple nodes because it can appropriately reflect uncertainty as well as unreliability of the observations. The simulation results show that the proposed scheme is highly resilient to attackers and it can converge stably to a common outlier view amongst distributed nodes with a limited communication overhead.en
dc.description.urihttps://ieeexplore.ieee.org/document/5088926en
dc.format.extent10 pagesen
dc.genreconference papers and proceedings preprintsen
dc.identifierdoi:10.13016/M2057CW9K
dc.identifier.citationWenjia Li and Anupam Joshi, Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory, 10th International Conference on Mobile Data Management (MDM 2009), DOI: 10.1109/MDM.2009.22en
dc.identifier.uri10.1109/MDM.2009.22
dc.identifier.urihttp://hdl.handle.net/11603/12057
dc.language.isoenen
dc.publisherIEEEen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 20XX IEEE
dc.subjectmaneten
dc.subjectmisbehavior detectionen
dc.subjectsecurityen
dc.subjectAd hoc networksen
dc.subjectPeer to peer computingen
dc.subjectDetection algorithmsen
dc.subjectMobile ad hoc networksen
dc.subjecttelecommunication computingen
dc.subjectUMBC Ebiquity Research Groupen
dc.titleOutlier Detection in Ad Hoc Networks Using Dempster-Shafer Theoryen
dc.typeTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
448.pdf
Size:
476.19 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: