Skip to main content

Cost-Effective IDS Operating Scheme in MANETs

  • Conference paper
  • 504 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Abstract

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without any established infrastructure. MANETs are generally more vulnerable to security threats than fixed wired network due to its inherent characteristics such as absence of infrastructure, dynamically changing topologies. The selection of IDS operating node is one of critical issues because of energy limited feature of a MANET. In this paper, we propose a cost-effective IDS operating node selection scheme by solving cost minimization problem in a MANET. The results illustrate that our proposed algorithm can reduce the total cost while maintaining appropriate security level in a MANET.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Patwardhan, A., Parker, J., Joshi, A.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. of the 23rd IEEE International Conf. on Pervasive Computing and Communications, IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  2. Alampalaym, S., Kumer, A., Srinivasan, S.: Mobile Ad hoc Network Security- a Taxonomy. In: Proc. of the 7th International Conf. on ICACT, vol. 2, pp. 839–844 (2005)

    Google Scholar 

  3. Helmer, G., Johnny, S., Wong, K., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. Journal of Systems and Software 67(Issue 2), 109–122 (2003)

    Article  Google Scholar 

  4. Stamouli, I., Argyroudis, P.G., Tewari, H.: Real-time Intrusion Detection for Ad hoc Networks. In: Proc. of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  5. Venkatraman, L., Agrawal, D.: A Novel Authentication Scheme for Ad Hoc Networks. In: Proc. of Wireless Communications and Networking Conference, vol. 3, pp. 1268–1273 (2000)

    Google Scholar 

  6. Kim, H.W., Kim, D.W., Kim, S.H.: Lifetime-enhancing Selection of Monitoring Nodes for Intrusion Detection in Mobile Ad Hoc Networks. AEU-International Journal of Electronics and Communications 60(Issue 3), 248–250 (2006)

    Article  Google Scholar 

  7. Chang, J.H., Tassiulas, L.: Energy Conserving Routing in Wireless Ad-hoc Networks. In: Proc. INFOCOM, Tel Aviv, pp. 22–31 (2000)

    Google Scholar 

  8. Chlamtac, I., Conti, M., Jennifer, J., Liu, N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 1(Issue 1), 13–64 (2003)

    Article  Google Scholar 

  9. Jakobsson, M., Wang, X., Wetzel, S.: Stealth Attacks in Vehicular Technologies. In: Proc. of IEEE Vehicular Technology Conference, IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  10. Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security 10(Issue 1–2), 5–22 (2002)

    Google Scholar 

  11. Li, J.: Early Statistical Anomaly Intrusion Detection of DOS Attacks Using MIB Traffic Parameters. In: Proc. of the 2003 IEEE Workshop on Information Assurance United States Military Academy, vol. 2, pp. 53–59. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  12. Sun, B., Wu, K., Pooch, U.W.: Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of Global Telecommunications Conference, vol. 6, pp. 3551–3555 (2004)

    Google Scholar 

  13. Northcutt, S.: Intrusion Detection: An Analyst’s Handbook. New Riders, Indianapolis (1999)

    Google Scholar 

  14. Bace, R.: Intrusion Detection. Macmillan Technical Publishing, Indianapolis (2000)

    Google Scholar 

  15. Kim, S.H.: Lecture Note on Nonlinear Programming. Non-linear programming course (2003)

    Google Scholar 

  16. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security, Springer, Heidelberg (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Jeong, Y., Han, Y., Kim, H., Shim, W., Kim, J., Kim, S. (2007). Cost-Effective IDS Operating Scheme in MANETs. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics