IEEEXplore (4) - Second International Symposium on...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks Chuan-xiang Ma, Ze-ming Fang School of Mathematics and Computer Science. Hubei University, Wuhan Hubei,China 430062 fangzm@yahoo.com.cn Ze-ming Fang: the corresponding author. This research is supported by National Natural Science Foundation of China (No: 60603069) , the projects of science and research plan of Hubei provincial department of education (D20060003) and the Natural Science Foundation Of Hubei Province of China (2006ABA016). Abstract Due to resource limitation, it is an optimum solution for intrusion detection in mobile Ad-hoc networks (MANETs) that all nodes investigate system and user activities while a subset of network nodes are selected as monitoring nodes to monitor and detect network packets. In this paper, a novel intrusion detection architecture for energy-constrained mobile Ad-hoc networks is proposed, in which the network detection module is optional. Monitoring nodes are selected by activating the network detection model to work. A selection scheme of monitoring nodes called Event Triggering Based Adaptive Selection (ETBAS) is also proposed, which introduces the mechanism of monitoring states and the method of event triggering. Triggering events, for example, a node has been voted to be a monitoring node by its neighbors, the battery power of a monitoring node has consumed to a threshold, or the networks topology has changed, can activate a non-monitoring node, or make a monitoring node fall asleep. High connectivity and energy resource are balanced in ETBAS for adaptive selection scheme, which is adaptable to dynamically changing networks and enhances the network lifetime. 1. Introduction Compared with traditional wire or wireless network, security in mobile Ad hoc networks is hard to achieve for dynamically changing, distributed collaboration, lacking of certification center and the limitation of node energy resources. In the recent years, intrusion detection technology has been applied into Ad-hoc networks to resolve those security problems, but efficiency architecture for energy-constrained wireless network is an unavoidable challenge. A distributed and cooperative intrusion detection architecture for mobile wireless networks is proposed by Zhang etc in [1], in which every node should participate in local and network intrusion detection and response. On account of the additional resources consumed during monitoring and detecting, this architecture is not efficient in utilizing the limited network energy resources. Anjum etc in [2] showed that it is certainly not necessary for all the nodes to run the IDS. Instead, they can be selected randomly on the network and the number of IDS node can be defined in order to obtain a good percentage of detection. In order to save energy resources, the problem of
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

IEEEXplore (4) - Second International Symposium on...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online