An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks

被引:8
作者
Sen, Jaydip [1 ]
机构
[1] Tata Consultancy Serv Ltd, Innovat Lab, Kolkata, India
来源
2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN) | 2010年
关键词
intrusion detection; wireless ad hoc networks; cluster; security; denial of service attack;
D O I
10.1109/CICSyN.2010.51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. In this paper, we present a cooperative, distributed intrusion detection architecture based on clustering of the nodes that addresses the security vulnerabilities of the network and facilitates accurate detection of attacks. The architecture is organized as a dynamic hierarchy in which the intrusion data is acquired by the nodes and is incrementally aggregated, reduced in volume and analyzed as it flows upwards to the cluster-head. The cluster-heads of adjacent clusters communicate with each other in case of cooperative intrusion detection. For intrusion related message communication, mobile agents are used for their efficiency in lightweight computation and suitability in cooperative intrusion detection. Simulation results show effectiveness and efficiency of the proposed architecture.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 16 条
[1]  
Albers P., 2002, Proc. 1st International Workshop on Wireless Information Systems, P1
[2]  
[Anonymous], NS 2 SIMULATOR
[3]  
Banerjee S., 2001, P IEEE INFOCOM
[4]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[5]  
Farmer W., 1996, LNCS
[6]   A survey of secure wireless ad hoc routing [J].
Hu, YC ;
Perrig, A .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :28-39
[7]  
Kachirski O., 2002, P 36 HAW INT C SYST
[8]  
Li C., 2004, P 2 INT C INF TECHN
[9]   Adaptive clustering for mobile wireless networks [J].
Lin, CHR ;
Gerla, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (07) :1265-1275
[10]  
Ramachandran L., 2000, 4 INT WORKSHOP DISCR, P54