Location estimation of an intruder in wireless ad hoc networks

Security within wireless ad hoc networks is hard to achieve due to the vulnerabilities in the data transmission process and the continuously changing network topology. An intrusion detection system is therefore essential to exclude any malicious nodes from the network. Furthermore, localization of the intruder helps in avoiding further attacks from the same user on the system. This paper proposes the application of a genetic algorithm to estimate the location of such malicious nodes. Simulation results show that with nine anchor nodes in a 1 km by 1 km area, the algorithm is capable of estimating the intruderpsilas position within a radius of 45 meters in 60% of the cases. Additionally, the accuracy of the algorithm improves as the number of anchor nodes increases.

[1]  H.T. Friis,et al.  A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.

[2]  Giovanni Vigna,et al.  NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[3]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[4]  Zheng Zhang,et al.  HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[5]  Garrison W. Greenwood,et al.  Localization using evolution strategies in sensornets , 2005, 2005 IEEE Congress on Evolutionary Computation.

[6]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[7]  Jun Zheng,et al.  An Anomaly Intrusion Detection System Based on Vector Quantization , 2006, IEICE Trans. Inf. Syst..

[8]  B. R. Badrinath,et al.  Localized positioning in ad hoc networks , 2003, Ad Hoc Networks.

[9]  Hisato Iwai,et al.  Self-Organizing Location Estimation Method using Ad-hoc Networks , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[10]  Hitesh Tewari,et al.  Real-time intrusion detection for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.