A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

被引:41
|
作者
Marchang, Ningrinla [1 ]
Datta, Raja [2 ]
Das, Sajal K. [3 ]
机构
[1] North Eastern Reg Inst Sci & Technol, Dept Comp Sci & Engn, Itanagar 791109, India
[2] Indian Inst Technol Kharagpur, Dept Elect & Elect Commun Engn, Kharagpur 721302, W Bengal, India
[3] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
基金
美国国家科学基金会;
关键词
Ad hoc networks; energy efficiency; intrusion detection;
D O I
10.1109/TVT.2016.2557808
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in which the nodes are resource constrained. Intrusion detection systems (IDSs) are used in MANETs to monitor activities to detect any intrusion in the otherwise vulnerable network. In this paper, we present efficient schemes for analyzing and optimizing the time duration for which the IDSs need to remain active in a MANET. A probabilistic model is proposed, which makes use of cooperation between IDSs among neighborhood nodes to reduce their individual active time. Typically, an IDS has to run all the time on every node to oversee network behavior. This can turn out to be a costly overhead for a battery-powered mobile device in terms of power and computational resources. Hence, in this work, our aim is to reduce the duration of active time of the IDSs without compromising their effectiveness. To validate our proposed approach, we model the interactions between IDSs as a multiplayer cooperative game in which the players have partially cooperative and partially conflicting goals. We theoretically analyze this game and support it with simulation results.
引用
收藏
页码:1684 / 1695
页数:12
相关论文
共 50 条
  • [31] Cross layer intrusion detection system of mobile ad hoc networks using feature selection approach
    Poongothai, T. (poongothait@gmail.com), 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (13):
  • [32] A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
    M. Islabudeen
    M. K. Kavitha Devi
    Wireless Personal Communications, 2020, 112 : 193 - 224
  • [33] Cross layer intrusion detection system of mobile ad hoc networks using feature selection approach
    Poongothai, T.
    Duraiswamy, K.
    WSEAS Transactions on Communications, 2014, 13 (01): : 71 - 79
  • [34] A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
    Islabudeen, M.
    Devi, M. K. Kavitha
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 193 - 224
  • [35] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [36] Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks
    Sen, Sevil
    Clark, John A.
    PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE, 2008, 5351 : 1053 - 1058
  • [37] Towards adaptive intrusion detection in Mobile Ad hoc Networks
    Sun, B
    Wu, K
    Pooch, UW
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 3551 - 3555
  • [38] On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
    Boppana, Rajendra V.
    Su, Xu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) : 1162 - 1174
  • [39] Intrusion Detection Systems in Mobile Ad Hoc Networks: A Survey
    Elboukhari, Mohamed
    Azizi, Mostafa
    Azizi, Abdelmalek
    2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), 2014, : 136 - 141
  • [40] An intrusion detection system for suburban ad hoc networks
    Islam, Muhammad Mahmudul
    Pose, Ronald
    Kopp, Carlo
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 47 - +