A rank sequence method for detecting black hole attack in ad hoc network

Xiong Kai, Yin Mingyong, Li Wenkang, Jiang Hong
{"title":"A rank sequence method for detecting black hole attack in ad hoc network","authors":"Xiong Kai, Yin Mingyong, Li Wenkang, Jiang Hong","doi":"10.1109/ICAIOT.2015.7111559","DOIUrl":null,"url":null,"abstract":"This paper discusses one of the route security problems called the black hole attack. In the network, we can capture some AODV route tables to gain a rank sequences by using the FP-Growth, which is a data association rule mining. We choose the rank sequences for detecting the malicious node because the rank sequences are not sensitive to the noise interfered. A suspicious set consists of nodes which are selected by whether the rank of a node is changed in the sequence. Then, we use the DE-Cusum to distinguish the black hole route and normal one in the suspicious set. In this paper, the FP-Growth reflects an idea which is about reducing data dimensions. This algorithm excludes many normal nodes before the DE-Cusum detection because the normal node has a stable rank in a sequence. In the simulation, we use the NS2 to build a black hole attack scenario with 11 nodes. Simulation results show that the proposed algorithm can reduce much vain detection.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIOT.2015.7111559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

This paper discusses one of the route security problems called the black hole attack. In the network, we can capture some AODV route tables to gain a rank sequences by using the FP-Growth, which is a data association rule mining. We choose the rank sequences for detecting the malicious node because the rank sequences are not sensitive to the noise interfered. A suspicious set consists of nodes which are selected by whether the rank of a node is changed in the sequence. Then, we use the DE-Cusum to distinguish the black hole route and normal one in the suspicious set. In this paper, the FP-Growth reflects an idea which is about reducing data dimensions. This algorithm excludes many normal nodes before the DE-Cusum detection because the normal node has a stable rank in a sequence. In the simulation, we use the NS2 to build a black hole attack scenario with 11 nodes. Simulation results show that the proposed algorithm can reduce much vain detection.
一种自组织网络中黑洞攻击检测的秩序列方法
本文讨论了一种称为黑洞攻击的路由安全问题。在网络中,我们可以通过使用FP-Growth(一种数据关联规则挖掘)捕获一些AODV路由表来获得一个秩序列。由于秩序列对噪声干扰不敏感,我们选择秩序列来检测恶意节点。可疑集由节点组成,这些节点是根据节点在序列中的秩是否改变来选择的。然后,我们使用DE-Cusum在可疑集中区分黑洞路线和正常路线。在本文中,FP-Growth反映了一个关于减少数据维度的想法。该算法在DE-Cusum检测之前排除了许多正常节点,因为正常节点在序列中具有稳定的秩。在仿真中,我们使用NS2构建了一个有11个节点的黑洞攻击场景。仿真结果表明,该算法可以有效地减少无用检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信