ARTICLE
TITLE

Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation

SUMMARY

The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to the high mobility of nodes, the weakness of transmission media and the absence of central node. To overcome the vulnerability, this paper mainly studies the way to detect selfish nodes in the MANET, and thus prevent network intrusion. Specifically, a data-driven reputation evaluation model was proposed to detect selfish nodes using a new reputation mechanism. The mechanism consists of a monitoring module, a reputation evaluation module, penalty module and a response module. The MANET integrated with our reputation mechanism was compared with the traditional MANET through simulation. The results show that the addition of reputation mechanism can suppress the selfish behavior of network nodes and enhance network security.

 Articles related

Benny Wijaya,Arie Pratama    

Permasalahan yang ada diwarnet cyber terletak pada belum terdapatnya sistem keamanan server warnet, oleh karena itu beberapa kali server warnet cyber mengalami permasalahan karena adanya penyerangan yang dilakukan oleh pihak lain seperti ping flood, smur... see more


Fadlin Arsin,Muh. Yamin,La Surimi    

Kemampuan untuk mengakses dan menyediakan informasi ataupun data-data secara cepat dan akurat menjadi sangat dibutuhkan bagi sebuah organisasi, baik yang berupa organisasi komersial (perusahaan), instansi, perguruan tinggi, lembaga pemerintahan, maupun i... see more

Revista: semanTIK

Muhammad Sadam Husain,LM Fid Aksara,Natalis Ransi    

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Techno's Studio is a company engaged in technology and is a company that uses wi... see more

Revista: semanTIK

Saidat Adebukola Onashoga,Adio Taofiki Akinwale,Opeyemi L. Amusa,Gboyega Adebayo    

Intrusion Detection Systems (IDSs) are an integral part of an organization's infrastructure. Without an IDS facility in place to monitor network and host activities, attempted and successful intrusion attempts may go unnoticed. This study proposed a Coll... see more


Bambang Sugiantoro    

As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later deve... see more