Skip to main content

A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6863))

  • 847 Accesses

Abstract

This paper presents a hierarchical cluster-based IDS architecture for Mobile Ad-hoc NETworks (MANETs) that considers the mobility and energy of nodes in the cluster formation in order to improve detection accuracy and reduce energy consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm (MEACA), which is the most appropriate for IDS in MANETs, since it aims at forming mobility aware and energy efficient 1-hop clusters. The algorithm maximizes the clusters’ stability by choosing nodes with relatively low mobility and high energy to be the cluster-heads and keeping the constructed clusters unchanged to the extent of their maximum possible lifetime. The key advantage of the proposed IDS is that its detection accuracy is not affected from nodes mobility, since each cluster includes nodes with similar direction and speed. Thus, mobile nodes of the same cluster appear more static to each other eliminating cluster reformation, which negatively affects the detection accuracy. Moreover, the distribution of the detection load is based on the remaining energy in each node. Thus, nodes with adequate energy undertake more detection responsibilities than nodes with low power. In this way, the proposed IDS balances the energy consumption in a fair and efficient manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mishra, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 11(1), 48–60 (2004)

    Article  Google Scholar 

  2. Rafsanjani, M., Movaghar, A., Koroupi, F.: Investigating Intrusion Detection Sys-tems in MANET and Comparing IDS for Detecting Misbehaving Nodes. Proceeding of the World Academy of Science, Engineering and Technology 34, 351–355 (2008)

    Google Scholar 

  3. Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. 170–196. Springer, Heidelberg

    Google Scholar 

  4. Panos, C., Xenakis, C., Stavrakakis, I.: A Novel Intrusion Detection System for MANETs. In: Proc. of International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece (2010)

    Google Scholar 

  5. Ma, C., Fang, Z.: A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks. In: Proc. IEEE Second International Symposium on Intelligent Information Technology and Security Informatics, pp. 198–201 (2009)

    Google Scholar 

  6. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Elsevier Computer Communications 31(4), 708–721 (2008)

    Article  Google Scholar 

  7. Marchang, N., Datta, R.: Collaborative techniques for intrusion detection in mo-bile ad hoc networks. Elsevier Ad Hoc Networks 6(4), 508–523 (2008)

    Article  Google Scholar 

  8. Deng, H., Xu, R., Li, J., Zhang, F., Levy, R., Lee, W.: Agent-based cooperative anomaly detection for wireless ad hoc networks. In: Proc. of the 12th Conference on Parallel and Distributed Systems, pp. 613–620 (2006)

    Google Scholar 

  9. Manousakis, K., Sterne, D., Ivanic, N., Lawler, G., McAuley, A.: A stochastic approximation approach for improving intrusion detection data fusion structures. In: Proc. of IEEE Military Communications Conference (MILCOM 2008), San Diego, CA, pp. 1–7 (2008)

    Google Scholar 

  10. Sun, B., Wu, K., Xiao, Y., Wang, R.: Integration of mobility and intrusion detec-tion for wireless ad hoc networks. Wiley International Journal of Communication Systems 20(6), 695–721 (2007)

    Article  Google Scholar 

  11. Sun, B., Wu, K., Pooch, U.W.: Routing anomaly detection in mobile ad hoc networks. In: Proc. of IEEE International Conference on Computer Communications and Networks (ICCCN 2003), pp. 25–31 (2003)

    Google Scholar 

  12. Xu, Y., Wang, W.: MEACA: Mobility and Energy Aware Clustering Algorithm for Constructing Stable MANETs. In: Proc. of IEEE Military Communications Conference (MILCOM 2006), Washington, D.C., pp. 1–7 (2006)

    Google Scholar 

  13. Xenakis, C., Panos, C., Stavrakakis, I.: A Comparative Evaluation of Intrusion De-tection Architectures for Mobile Ad Hoc Networks. Computers & Security 30(1), 63–80 (2011)

    Google Scholar 

  14. Leng, S., Zhang, Y., Chen, H., Zhang, L., Liu, K.: A Novel k-Hop Compound Met-ric Based Clustering Scheme for Ad Hoc Wireless Networks. IEEE Transactions On Wireless Communications 8(1), 367–375 (2009)

    Article  Google Scholar 

  15. Lee, S.-J., Su, W., Gerla, M.: Ad hoc Wireless Multicast with. Mobility Prediction. In: Proc. of IEEE ICCCN 1999, Boston, pp. 4–9 (1999)

    Google Scholar 

  16. Gavalas, D., Konstantopoulos, C., Pantziou, G.: Mobility Prediction in Mobile Ad Hoc Networks. In: Pierre, S. (ed.) Next Generation Mobile Networks and Ubiquitous Computing, ch. 21, pp. 226–240. IGI Global, USA (2010) ISBN10: 160566250X

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Darra, E., Ntantogian, C., Xenakis, C., Katsikas, S. (2011). A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22890-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22889-6

  • Online ISBN: 978-3-642-22890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics