Outlier detection using naïve bayes in wireless ad hoc networks

Nowadays, security is one of the most significant concerns when constructing a flexible and improvisational network. For a wireless ad hoc network, which is exposed to an open and cooperative environment, its vulnerability needs a more effective protection for the validation of information sharing, when compared to traditional networks. At present, trust gains extensive attention as it is regarded as a well-known distributed management method to perceive abnormal behavior of other nodes. In this paper, we emphasize the importance of node cooperation, especially for the sharing of trust information. Thereby, an outlier detection scheme is presented based on Naïve Bayes algorithm, which is used to predict the reliability of trust information provided by other adjacent nodes. We examine the scheme based on our design criteria and attack models. Through the security analysis, Naïve Bayes makes the trust-based outlier detection more suitable and reliable for distributed networks.

[1]  John S. Baras,et al.  A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.

[2]  Guangjie Han,et al.  A Reliable and Efficient Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Intelligent Computer Communication and Processing.

[3]  Heikki Mannila,et al.  Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.

[4]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[5]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[6]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[7]  Chris Hankin,et al.  Formal Security Analysis for Ad-Hoc Networks , 2006, Electron. Notes Theor. Comput. Sci..

[8]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[9]  Davis,et al.  Principles of Data Mining , 2001 .

[10]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[11]  J. Zhan,et al.  A Novel Outlier Detection Scheme for Network Intrusion Detection Systems , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[12]  Guangjie Han,et al.  A Reliable Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[13]  Qiuna Niu Formal analysis of secure routing protocol for ad hoc networks , 2009, 2009 International Conference on Wireless Communications & Signal Processing.

[14]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[15]  Kefei Cheng,et al.  Rough Set Weighted Naïve Bayesian Classifier in Intrusion Prevention System , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.