By Topic

Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Wenjia Li ; Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland, Baltimore, MD ; Anupam Joshi

Mobile ad-hoc networks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes rely on either a predefined threshold, or a set of well-defined training data to build up the detection mechanism before effectively identifying the malicious peers. However, it is generally difficult to set appropriate thresholds, and collecting training datasets representative of an attack ahead of time is also problematic. We observe that the malicious peers generally demonstrate behavioral patterns different from all the other normal peers, and argue that outlier detection techniques can be used to detect malicious peers in ad hoc networks. A problem with this approach is combining evidence from potentially untrustworthy peers to detect the outliers. In this paper, an outlier detection algorithm is proposed that applies the Dempster-Shafer theory to combine observation results from multiple nodes because it can appropriately reflect uncertainty as well as unreliability of the observations. The simulation results show that the proposed scheme is highly resilient to attackers and it can converge stably to a common outlier view amongst distributed nodes with a limited communication overhead.

Published in:

2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware

Date of Conference:

18-20 May 2009