Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1514274.1514295acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Mobi-watchdog: you can steal, but you can't run!

Published: 16 March 2009 Publication History

Abstract

Recent years have witnessed widespread use of mobile devices such as cell phones, laptops, and PDAs. In this paper, we propose an architecture called Mobi-Watchdog to detect mobility anomalies of mobile devices in wireless networks that track their locations regularly. Given the past mobility records of a mobile device, Mobi-Watchdog uses clustering techniques to identify the high-level structure of its mobility and then trains a HHMM (hierarchical hidden Markov model). Mobi-Watchdog raises an alert by requesting the device holder to reauthenticate himself when it finds an observed mobility trace significantly deviates from the trained model. The time complexity of the original generalized Baum-Welch algorithm, which is used for HHMM parameter reestimation, scales linearly with T3, where T is the number of locations in an observed sequence. Such a high computational cost can significantly impede deployment of Mobi-Watchdog in large-scale wireless networks in practice. To achieve better scalability, we modify this algorithm to make it scale linearly with T instead. Experimental results with realistic mobility traces demonstrate that Mobi-Watchdog detects mobility anomalies with high probability and reasonably low false alarm rates. We also show that Mobi-Watchdog has very low computational overhead, which makes it a viable candidate for mobility anomaly detection in large wireless networks.

References

[1]
S. V. Dongen. Graph Clustering by Flow Simulation. PhD thesis, University of Utrecht, May 2000.
[2]
A. J. Enright, S. V. Dongen, and C. A. Ouzounis. An efficient algorthm for large-scale detection of protein families. Nucleic Acids Research, 30(7), 2002.
[3]
F. Erbas, K. Kyamakya, J. Steuer, and K. Jobmann. On the user profiles and the prediction of user movements in wireless networks. In Proceedings of IEEE PIMRC, 2002.
[4]
S. Fine, Y. Singer, and N. Tishby. The hierarchical hidden Markov model: Analysis and applications. Machine Learning, 32, 1998.
[5]
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 2008.
[6]
A. Jardosh, E. M. Belding-Royer, K. C. Almeroth, and S. Suri. Towards realistic models for mobile ad hoc networks. In Proc. of MobiCom, 2003.
[7]
J. Kim. Realistic mobility modeling and simulation for mobile wireless network in urban environments. Master's thesis, University of Deleware, 2005.
[8]
Lin Liao and Dieter F. Kautz. Extracting places and activities from gps traces using hierarchical conditional random fields. Artificial Intelligence, 2007.
[9]
http://www.washingtonpost.com/wp-dyn/content/article/2005/07/24/AR2005072%401135.html.
[10]
K. Murphy and M. Paskin. Linear time inference in hierarchical HMMs. In Advances in Neural Information Processing Systems 13. MIT Press, Cambridge, MA, 2002.
[11]
M. Musolesi, S. Hailes, and C. Mascolo. An ad hoc mobility model founded on social newtork theory. In Proceedings of MSWiM'04, 2004.
[12]
L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proc. of the IEEE, February 1989.
[13]
Reality mining project. http://reality.media.mit.edu/.
[14]
S. Schonfelder. Some notes on space, location and travel behavior. In Swiss Transport Research Conference, Monte Verita, Ascona, 2001.
[15]
J. Scourias and T. Kunz. An activity-based mobility model and location management simulation framework. In Proceedings of MSWiM'99, New York, NY, USA, 1999.
[16]
B. Sun, Y. Xiao, and R. Wang. Detection of fraudulent usage in wireless networks. IEEE Trans. on Vehicular Technology, 56(6), 2007.
[17]
B. Sun, F. Yu, K. Wu, Y. Xiao, and V. C. M. Leung. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Trans. on Vehicular Technology, 55(3), 2006.
[18]
http://cbs5.com/consumer/wireless.runaround.2.451677.html.
[19]
H. Zhang, H. Yu, D. Xiong, and Q. Liu. HHMM-based Chinese lexical analyzer. In Proceedings of the 2nd SIGHAN workshop on Chinese language processing, 2003.
[20]
J. Zhang. Handbook of Wireless Networks and Mobile Computing, chapter Location Management in Cellular Networks. John Wiley & Sons, Inc., 2002.

Cited By

View all
  • (2018)Recognizing human behaviours in online social networksComputers and Security10.1016/j.cose.2017.06.00274:C(355-370)Online publication date: 1-May-2018
  • (2017)Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s MobilityBusiness Information Systems Workshops10.1007/978-3-319-69023-0_21(242-254)Online publication date: 18-Oct-2017
  • (2015)Study on Data Fusion Techniques in Wireless Sensor NetworksProceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation10.2991/978-94-6239-145-1_7(67-74)Online publication date: 13-Oct-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '09: Proceedings of the second ACM conference on Wireless network security
March 2009
280 pages
ISBN:9781605584607
DOI:10.1145/1514274
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. hhmm
  3. mobility
  4. wireless networks

Qualifiers

  • Research-article

Conference

WISEC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Recognizing human behaviours in online social networksComputers and Security10.1016/j.cose.2017.06.00274:C(355-370)Online publication date: 1-May-2018
  • (2017)Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s MobilityBusiness Information Systems Workshops10.1007/978-3-319-69023-0_21(242-254)Online publication date: 18-Oct-2017
  • (2015)Study on Data Fusion Techniques in Wireless Sensor NetworksProceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation10.2991/978-94-6239-145-1_7(67-74)Online publication date: 13-Oct-2015
  • (2015)Cloud based intrusion detection architecture for smartphones2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)10.1109/ICIIECS.2015.7193252(1-6)Online publication date: Mar-2015
  • (2015)Ensuring consistency file authentication over encrypted files in the cloud2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)10.1109/ICIIECS.2015.7192941(1-5)Online publication date: Mar-2015
  • (2014)Sim-WatchdogProceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems10.1109/ICDCS.2014.24(154-165)Online publication date: 30-Jun-2014
  • (2014)Spatio-temporal patterns link your digital identitiesComputers, Environment and Urban Systems10.1016/j.compenvurbsys.2013.12.00447(58-67)Online publication date: Sep-2014
  • (2014)Efficient location aware intrusion detection to protect mobile devicesPersonal and Ubiquitous Computing10.1007/s00779-012-0628-918:1(143-162)Online publication date: 1-Jan-2014
  • (2012)Efficient Intrusion Detection for Mobile Devices Using Spatio-temporal Mobility PatternsMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-642-29154-8_35(342-343)Online publication date: 2012
  • (2011)A novel reputation computation model based on subjective logic for mobile ad hoc networksFuture Generation Computer Systems10.1016/j.future.2010.03.00627:5(547-554)Online publication date: 1-May-2011
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media