Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

Update on Saturday, 19 June 2021: Paper 16.Cnf-64@MIC-CCA 2011 reaches 603 views and 262 downloads.
Papers Links
  • Browse
  • Subjects
  • Years
  • CNIT
  • GC-CNIT 2009
  • 14.Cnf-50
Papers Published at GC-CNIT 2009
All 4 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-583 Dr. Abdulkader O. Alwer

New Method to reduce Latency in Fast Handover for MIPv6 on Predictive Mode
13-21
14.Cnf-599



Harmonic Based Patching Scheme for VOD
22-29
14.Cnf-50 Paper View Page
Title Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
Authors Dr. Iman Almomani, University of Jordan, Amman, Jordan
Ms. Maryam Al-Sharief, University of Jordan, Amman, Jordan
Ms. Rawa'a Aljabaly, University of Jordan, Amman, Jordan
Abstract Wireless Sensors Network (WSN) is a type of ad hoc networks in which resources like energy and bandwidth are limited. WSNs are used in many applications such as environmental monitoring, traffic control, healthcare, and military applications. Properties of WSNs such as limited resources make them vulnerable to different kinds of attackers which caused Intrusion Detection Systems (IDS) to be proposed to protect them from intruders. IDS systems when used with cluster-based communications protocols have two different behaviors regarding the action to be taken when a node is detected to be compromised. Some systems exclude the compromised node from the whole cluster rounds while other systems exclude it only from the current round and then deal with it as normal node back in next rounds. In this paper an algorithm that combines the two behaviors together is proposed. In the proposed algorithm, the compromised node is not excluded from the first cluster round; neither it is considered normal in next rounds. Our approach involves building a reputation for the node in the Base Station and excludes the node only when it has a history bad enough to be excluded.
Track CCN: Communications and Computer Networks
Conference 3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009)
Congress 2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009), 21-23 December 2009, Amman, Jordan
Pages 1-5
Topics Wireless Ad hoc Networks
Network Security and Privacy
Wireless Sensor Networks
Wireless Communication Networks
ISSN 2227-331X
DOI
BibTeX @inproceedings{50CNIT2009,
title={Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks},
author={Iman Almomani, and Maryam Al-Sharief, and Rawa'a Aljabaly},
booktitle={2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009)},
year={2009},
pages={1-5},
doi={}},
organization={Mosharaka for Research and Studies} }
Paper Views 918 Paper Views Rank 70/525
Paper Downloads 416 Paper Downloads Rank 52/525
GC-CNIT 2009 Visits: 4628||MIC-CNIT 2009 Visits: 3329||CCN Track Visits: 1819