22nd International Conference on Advanced Information Networking and Applications (Aina 2008) 2008
DOI: 10.1109/aina.2008.124
|View full text |Cite
|
Sign up to set email alerts
|

IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks

Abstract: An Ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure, so they are vulnerable to many attacks and the security of the network can not be ensued. In this paper, we present a novel Intrusion Detection Mechanism based on the Trust Model (IDMTM) for mobile Ad hoc networks. In IDMTM, we employ two new concepts: "Evidence Chain (EC)" and "Trust Fluctuation (TF)" to accurately evaluate the trust valu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…There are several additional issues that should be further studied in the future researches. Some of the most challenging proposed topics of these issues are as follows: security analyses of TMS‐HCW, finding its security vulnerabilities and improving them; discussing the methods for selfishness detection; improving the TMS‐HCW by adding an intrusion detection system (IDS) on the trustworthy nodes in the sensitive points of the hierarchical clustered WSN like CHs for analyzing the security status of the cluster's members; improving the TMS‐HCW by adding the capabilities of IDS in it; that is, combining the capabilities of TMSs and IDSs together, like IDMTM and TEREC , of course specifically for WSNs; discussing the effect of the clusters' size and the trust updating interval on the TMS‐HCW's performance and the hierarchical clustered WSN's lifetime; and investigating the feasibility of applying TMS‐HCW to the hierarchical routing protocols in clustered WSNs. …”
Section: Discussionmentioning
confidence: 99%
“…There are several additional issues that should be further studied in the future researches. Some of the most challenging proposed topics of these issues are as follows: security analyses of TMS‐HCW, finding its security vulnerabilities and improving them; discussing the methods for selfishness detection; improving the TMS‐HCW by adding an intrusion detection system (IDS) on the trustworthy nodes in the sensitive points of the hierarchical clustered WSN like CHs for analyzing the security status of the cluster's members; improving the TMS‐HCW by adding the capabilities of IDS in it; that is, combining the capabilities of TMSs and IDSs together, like IDMTM and TEREC , of course specifically for WSNs; discussing the effect of the clusters' size and the trust updating interval on the TMS‐HCW's performance and the hierarchical clustered WSN's lifetime; and investigating the feasibility of applying TMS‐HCW to the hierarchical routing protocols in clustered WSNs. …”
Section: Discussionmentioning
confidence: 99%
“…In the literature, few contributions combine trust and intrusion detection together. Wang et al [5] proposed an intrusion detection mechanism based on trust (IDMTM). This work considered both evidence chain (main malicious behavior forms) and trust fluctuation.…”
Section: A Intrusion Detection Trust Management and Game Theorymentioning
confidence: 99%
“…Therefore, novel address this kind of problems. security is to provide security intrusion detection [8,9], 1], access control [12], and nodes for effective routing [13, ATED WORK ective risk management which nder uncertainty and usefulness wn entity [16]. This section ed approaches used for gathering e trust.…”
Section: Trust Management In Manetsmentioning
confidence: 99%