LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Mitrokotsa, Aikaterini; Komninos, Nikos; Douligeris, Christos (2008)
Languages: English
Types: Unknown
Subjects: QA75, Computer Science - Networking and Internet Architecture, Computer Science - Cryptography and Security
In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. The proposed intrusion response model and the tree-based protocol, it is based on, are analyzed concerning key secrecy while the intrusion detection engine is evaluated for MANET under different traffic conditions and mobility patterns. The results show a high detection rate for packet dropping attacks.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Y. Zhang, W. Lee, Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks”, Wireless Networks Vol. 9, No. 5, (September 2003), pp. 545-556.
    • [2] Y. Huang, and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), Oct (2003), VA, USA, pp. 135-147.
    • [3] Y. Liu, Y. Li and H. Man, “MAC Layer Anomaly Detection in Ad Hoc Networks”, in Proc. of 6th IEEE Information Assurance Workshop, June (2005), NY.
    • [4] K. Becker and U.Wille, “Communication complexity of group key distribution”, in Proc. of 5th ACM Conference on Computer and Communications Security, 1998, pp. 1-6
    • [5] Y. Kim, A. Perrig, and G. Tsudik, “Tree-based group key agreement”, ACM Transactions on Information and System Security, Vol.7, No.1, February (2004), pp.60-96.
    • [6] Michael Steiner, Gene Tsudik and Michael Waidner, “CLIQUES: A new approach to group key agreement”, in Proc. of the 18th International Conference on Distributed Computing Systems, May (1998), pp.380-387.
    • [7] R. J. Hwang and R. C. Chang, “Key Agreement in Ad Hoc Networks”, LNCS Vol. 2745/2003 Parallel and Distributed Processing and Applications, pp.382-390.
    • [8] C. Lo, C. Huang and Y. Huang, “A Key Agreement Protocol Using Mutual Authentication for Ad-Hoc Networks”, in Proc. of International Conference on Services Systems and Services Management 2005 (ICSSSM'05), Vol. 2, June (2005), pp. 814-818
    • [9] A. Ultsch, “Data Mining and Knowledge Discovery with Emergent SOFMs for Multivariate Time Series”, In Kohonen Maps, Elsevier Science, (1999) pp. 33-46.
    • [10] A. Mitrokotsa, N. Komninos, C. Douligeris, “Intrusion Detection and Response in Ad Hoc Networks”, International Journal of Computer Research, to appear, available upon request.
    • [11] Databionic ESOM Tools, Available from
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article