An adaptive security Framework for ad hoc networks

Author(s):  
Vincent Toubiana ◽  
Houda Labiod ◽  
Laurent Raynaud ◽  
Yvon Gourhant
2016 ◽  
Vol 10 (4) ◽  
pp. 1-32 ◽  
Author(s):  
Abdelaziz Amara Korba ◽  
Mehdi Nafaa ◽  
Salim Ghanemi

In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.


2020 ◽  
pp. 1312-1346
Author(s):  
Abdelaziz Amara Korba ◽  
Mehdi Nafaa ◽  
Salim Ghanemi

In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.


2015 ◽  
Vol 3 (2) ◽  
pp. 134-140 ◽  
Author(s):  
Bartosz Lipiński ◽  
Wojciech Mazurczyk ◽  
Krzysztof Szczypiorski ◽  
Piotr Śmietanka

2002 ◽  
Vol 2 (5) ◽  
pp. 533-547 ◽  
Author(s):  
Jiejun Kong ◽  
Haiyun Luo ◽  
Kaixin Xu ◽  
Daniel Lihui Gu ◽  
Mario Gerla ◽  
...  

2014 ◽  
Vol 16 (5) ◽  
pp. 86-92
Author(s):  
Satyam Bestaramunboena ◽  
◽  
Srinivas Sandiri

2006 ◽  
Vol 7 (4) ◽  
pp. 493-501
Author(s):  
Rui-jun Yang ◽  
Qi Xia ◽  
Qun-hua Pan ◽  
Wei-nong Wang ◽  
Ming-lu Li

Sign in / Sign up

Export Citation Format

Share Document