An Extensible Environment for Evaluating Secure MANET

@article{Zhang2005AnEE,
  title={An Extensible Environment for Evaluating Secure MANET},
  author={Yongguang Zhang and Yi-an Huang and Wenke Lee},
  journal={First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)},
  year={2005},
  pages={339-352}
}
Developing and evaluating secure MANET (mobile adhoc networks) in real systems is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful performance measurements to evaluate both the impact of attacks and the performance of security solutions. It is desirable to have a development and testing environment that can automate this process. In this paper, we propose a software framework for such an environment and describe a system… CONTINUE READING

Figures, Results, and Topics from this paper.

Key Quantitative Results

  • Therefore, the detection rates for these direct violations of protocol specification are 100% and the false alarm rates are 0%.
  • For example, the clusterbased IDS detects the Sinkhole attack with 91% detection rate and less than 1% false alarm rate.

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation

  • 2011 31st International Conference on Distributed Computing Systems Workshops
  • 2011
VIEW 2 EXCERPTS
CITES BACKGROUND

Camouflaging mobility for itinerary privacy in mobile ad-hoc networks

  • 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Creating Offline MANET IDS Network Traces

  • 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
  • 2007

References

Publications referenced by this paper.
SHOWING 1-10 OF 15 REFERENCES

Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation

R.P. Lippmann, D.J. Fried, +8 authors M.A. Zissman
  • Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
  • 1998
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Secure ad hoc on-demand distance vector routing

  • Mobile Computing and Communications Review
  • 2002
VIEW 1 EXCERPT