Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
International Congress on Engineering Technologies (EngiTek 2022)
1-3 November 2022, Irbid, Jordan

EnginApps 2022

MechaniTek 2022

ElectriTek 2022
EngiTek 2022 MainEngiTek 2022 CFPEngiTek 2022 SubmissionsEngiTek 2022 ProgramEngiTek 2022 Registration
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

43 days remaining to submit papers to MIC-Control 2022 in Valencia, Spain
Papers Links
  • Browse
  • Subjects
  • Years
  • CNIT
  • GC-CNIT 2009
  • 14.Cnf-50
Papers Published at GC-CNIT 2009
All 3 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-583 Dr. Abdulkader O. Alwer

New Method to reduce Latency in Fast Handover for MIPv6 on Predictive Mode
13-21
14.Cnf-50 Paper View Page
Title Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
Authors Dr. Iman Almomani, University of Jordan, Amman, Jordan
Ms. Maryam Al-Sharief, University of Jordan, Amman, Jordan
Ms. Rawa'a Aljabaly, University of Jordan, Amman, Jordan
Abstract Wireless Sensors Network (WSN) is a type of ad hoc networks in which resources like energy and bandwidth are limited. WSNs are used in many applications such as environmental monitoring, traffic control, healthcare, and military applications. Properties of WSNs such as limited resources make them vulnerable to different kinds of attackers which caused Intrusion Detection Systems (IDS) to be proposed to protect them from intruders. IDS systems when used with cluster-based communications protocols have two different behaviors regarding the action to be taken when a node is detected to be compromised. Some systems exclude the compromised node from the whole cluster rounds while other systems exclude it only from the current round and then deal with it as normal node back in next rounds. In this paper an algorithm that combines the two behaviors together is proposed. In the proposed algorithm, the compromised node is not excluded from the first cluster round; neither it is considered normal in next rounds. Our approach involves building a reputation for the node in the Base Station and excludes the node only when it has a history bad enough to be excluded.
Track CCN: Communications and Computer Networks
Conference 3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009)
Congress 2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009), 21-23 December 2009, Amman, Jordan
Pages 1-5
Topics Wireless Ad hoc Networks
Network Security and Privacy
Wireless Sensor Networks
Wireless Communication Networks
ISSN 2227-331X
DOI
BibTeX @inproceedings{50CNIT2009,
title={Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks},
author={Iman Almomani, and Maryam Al-Sharief, and Rawa'a Aljabaly},
booktitle={2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009)},
year={2009},
pages={1-5},
doi={}},
organization={Mosharaka for Research and Studies} }
Paper Views 794 Paper Views Rank 67/525
Paper Downloads 375 Paper Downloads Rank 55/525
GC-CNIT 2009 Visits: 2742||MIC-CNIT 2009 Visits: 1898||CCN Track Visits: 1136