Improved Weight Clustering Algorithm for IDS in Mobile Ad hoc Network

被引:1
作者
Zhou, Jieying [1 ]
Chen, Jianfeng [1 ]
Xie, Weicong [1 ]
Li, Jing [1 ]
机构
[1] Sun Yat Sen Univ, Guangdong Prov Key Lab Informat Secur, Dept Elect & Commun Engn, Guangzhou 510275, Guangdong, Peoples R China
来源
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15 | 2007年
关键词
MANET; intrusion detection; clustering;
D O I
10.1109/WICOM.2007.394
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An IDS is a defense system that detects hostile activities in a network and then tries to prevent such activities that may compromise system security. This paper studies on IDS architecture and clustering algorithm, and proposes an improved weight clustering algorithm for IDS in MANET with considering node credibility, link stability and fairness in cluster head competition. By using this algorithm, the whole network can be divided into some subclusters and carries out an effective intrusion detection mechanism, which performs distributed detection in the whole network and centralized decision-making at local node. In addition, it can reduce the computation load and the amount of bandwidth which is extremely important for MANET due to limited bandwidth and low communication speed in MAN-ET. The proposed algorithm is simulated via OPNET. Simulation results show that IWCA has better adaptability for MANET than other relative protocols, and be suitable for IDS in MANET.
引用
收藏
页码:1565 / 1568
页数:4
相关论文
共 9 条
  • [1] A mobility based metric for clustering in mobile ad hoc networks
    Basu, P
    Khan, N
    Little, TDC
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2001, : 413 - 418
  • [2] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [3] Multicluster, mobile, multimedia radio network
    Gerla, Mario
    Tsai, Jack Tzu-Chieh
    [J]. WIRELESS NETWORKS, 1995, 1 (03) : 255 - 265
  • [4] GUANG ZY, 2000, P 6 ANN INT C MOB CO, P275
  • [5] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    [J]. IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158
  • [6] KARPIJOKI V, 2000, P HELS U TECHN SEM N
  • [7] LIN CHR, 1995, DISTRIBUTED ARCHITEC, P1468
  • [8] PERDIKEAS M, 1999, EVALUATION STUDY MOB, P287
  • [9] YASHINSAC A, 2002, J COMPUTER SECURITY, P177