A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks. Jalali, D. & Shahrbanoonezhad, A. In Digital Information Management (ICDIM), 2011 Sixth International Conference on, pages 187--192, September, 2011. 00000 bibtex: 6093331
doi  abstract   bibtex   
In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement of some factors in comparison with other last works and we simulated our methods by NS2 software.
@inproceedings{ jalali_new_2011,
  title = {A new method based on {Finite} {State} {Machine} for detecting misbehaving nodes in ad hoc networks},
  doi = {10.1109/ICDIM.2011.6093331},
  abstract = {In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement of some factors in comparison with other last works and we simulated our methods by NS2 software.},
  booktitle = {Digital {Information} {Management} ({ICDIM}), 2011 {Sixth} {International} {Conference} on},
  author = {Jalali, D.S. and Shahrbanoonezhad, A.},
  month = {September},
  year = {2011},
  note = {00000 bibtex: 6093331},
  keywords = {Ad hoc networks, FSM, Intrusion detection, Routing, Routing protocols, Software, ad hoc network, finite state machine, intrusion detection system, malicious node, misbehaving nodes, mobile ad hoc networks, network routing, routing packages, security, telecommunication network routing},
  pages = {187--192}
}

Downloads: 0