Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

167 days remaining to submit papers to MIC-InfoTech 2024 in Irbid, Jordan
Papers Links
  • Browse
  • Subjects
  • Years
  • CNIT
  • GC-CNIT 2009
  • 14.Cnf-50
Papers Published at GC-CNIT 2009
All 10 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-583 Dr. Abdulkader O. Alwer

New Method to reduce Latency in Fast Handover for MIPv6 on Predictive Mode
13-21
14.Cnf-599



Harmonic Based Patching Scheme for VOD
22-29
14.Cnf-603 Dr. Amer M. Al Canaan
Prof. Ahmed Khoumsi
Analysis and Quantification of Multimedia Web Services Performance Utilising Binary Data Compression
30-35
14.Cnf-665
Polynomial-Time Decodable Fingerprinting Codes for Multimedia
36-41
14.Cnf-695
A New Intrusion Detection System Model for Local Network Based on Support Vector Machine
42-46
14.Cnf-750
NEW SCHEME TO REDUCE DISCOVERY DELAY IN WIRELESS MESH NETWORKS BASED ON HANDOFF HISTORY
47-52
14.Cnf-829
Performance Analysis of Concurrent Transmission in Multi-hop Wireless Mesh Networks
53-59
14.Cnf-830 Muhammad Q. Khan
Prof. Steinar H. Andresen
Application of media independent handover (MIH) for intra technology handover
60-63
14.Cnf-50 Paper View Page
Title Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
Authors Dr. Iman Almomani, University of Jordan, Amman, Jordan
Ms. Maryam Al-Sharief, University of Jordan, Amman, Jordan
Ms. Rawa'a Aljabaly, University of Jordan, Amman, Jordan
Abstract Wireless Sensors Network (WSN) is a type of ad hoc networks in which resources like energy and bandwidth are limited. WSNs are used in many applications such as environmental monitoring, traffic control, healthcare, and military applications. Properties of WSNs such as limited resources make them vulnerable to different kinds of attackers which caused Intrusion Detection Systems (IDS) to be proposed to protect them from intruders. IDS systems when used with cluster-based communications protocols have two different behaviors regarding the action to be taken when a node is detected to be compromised. Some systems exclude the compromised node from the whole cluster rounds while other systems exclude it only from the current round and then deal with it as normal node back in next rounds. In this paper an algorithm that combines the two behaviors together is proposed. In the proposed algorithm, the compromised node is not excluded from the first cluster round; neither it is considered normal in next rounds. Our approach involves building a reputation for the node in the Base Station and excludes the node only when it has a history bad enough to be excluded.
Track CCN: Communications and Computer Networks
Conference 3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009)
Congress 2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009), 21-23 December 2009, Amman, Jordan
Pages 1-5
Topics Wireless Ad hoc Networks
Network Security and Privacy
Wireless Sensor Networks
Wireless Communication Networks
ISSN 2227-331X
DOI
BibTeX @inproceedings{50CNIT2009,
title={Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks},
author={Iman Almomani, and Maryam Al-Sharief, and Rawa'a Aljabaly},
booktitle={2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009)},
year={2009},
pages={1-5},
doi={}},
organization={Mosharaka for Research and Studies} }
Paper Views 56 Paper Views Rank 214/524
Paper Downloads 27 Paper Downloads Rank 182/524
GC-CNIT 2009 Visits: 9422||MIC-CNIT 2009 Visits: 7206||CCN Track Visits: 3401