Abstract
Cluster-based intrusion detection systems, where cluster heads (CHs) detect misbehavior of their member nodes, have been proposed in mobile ad-hoc networks (MANETs) in order to protect the network and save the energy. However, long-term survival of all nodes is more important so as not to partition the network. The extension of the network lifetime in the cluster-based IDS depends on which nodes are selected as CHs, which consume much more energy than cluster members due to monitoring them and detecting intrusions. In this paper, we propose a Distributed Energy Efficient Cluster Formation (DEECF) scheme, which exploits the expected residual energy of mobile nodes to select CHs and starts the cluster formation from leaf nodes to reduce the number of clusters. The scheme consists of the cluster construction algorithm and the cluster maintenance algorithm, both of which can be performed at each node in a distributed way without any global knowledge. We prove the correctness of the algorithms, and show that the DEECF scheme is more energy efficient than other clustering schemes by extensive simulation.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Network simulator 2 (2011). http://www.isi.edu/nsnam/ns/.
Ahmed, E., Samad, K., & Mahmood, W. (2006). Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks. In Proc. of the 5th AusCERT Asia Pacific information technology security conference (pp. 46–56).
Anantvalee, T., & Wu, J. (2006). Wireless and mobile network security, Chap. 7. In A survey on intrusion detection in mobile ad hoc networks (pp. 170–196). Berlin: Springer.
Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. New York: Wiley.
Bricard-Vieu, V., & Mikou, N. (2005). Qos in MANETs using a mobility prediction-based weighted clustering algorithm. In Networking and communications (WiMob’05): Vol. 3. Proc. of IEEE international conference on wireless and mobile computing (pp. 390–396).
Brutch, P., & Ko, C. (2003). Challenges in intrusion detection for wireless ad-hoc networks. In Proc. of symposium on applications and the Internet workshops (pp. 368–373).
Chang, J. H., & Tassiulas, L. (2000). Energy conserving routing in wireless ad-hoc networks. In Proc. of IEEE INFOCOM (Vol. 1, pp. 22–31).
Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193–204.
Chiang, C. C., Kuang, W. H., Liu, W., & Gerla, M. (1997). Routing in clustered multi-hop mobile wireless networks with fading channel. In Proc. of IEEE SICON (pp. 197–211). New York: IEEE Press.
Dhurandher, S. K., & Singh, G. V. (2005). Weight based adaptive clustering in wireless ad hoc networks. In Proc. of IEEE international conference on personal wireless communications (ICPWC’05) (pp. 95–100).
Fu, Y., He, J., & Li, G. (2007). A distributed intrusion detection scheme for mobile ad hoc networks. In Proc. of 31st annual international computer software and applications conference (COMPSAC’07) (Vol. 2, pp. 75–80).
Haynes, T. W., Hedetniemi, S., & Slater, P. (1999). Domination in graphs: advanced topics. Boca Raton: CRC Press.
Huang, Y., & Lee, W. (2003). A cooperative intrusion detection system for ad hoc networks. In Proc. of the 1st ACM workshop on security of ad hoc and sensor networks (SASN’03) (pp. 135–147).
Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In The Kluwer international series in engineering and computer science: Vol. 353. Mobile computing (pp. 153–181). New York: Springer.
Kasamatsu, D., Shinomiya, N., & Ohta, T. (2009). A broadcasting method considering battery lifetime and distance between nodes in Manet. In Proc. of the 29th IEEE international conference on distributed computing systems workshops (ICDCS’09) (pp. 406–411).
Kim, I. Y., Kim, Y. S., & Kim, K. C. (2006). Zone-based clustering for intrusion detection architecture in ad-hoc networks. In Lecture notes in computer science: Vol. 4238. Management of convergence networks and services (pp. 253–262). Berlin/Heidelberg: Springer.
Maleki, M., Dantu, K., & Pedram, M. (2002). Power-aware source routing protocol for mobile ad hoc networks. In Proc. of the international symposium on low power electronics and design (ISLPED’02) (pp. 72–75). New York: ACM Press.
Maleki, M., Dantu, K., & Pedram, M. (2003). Lifetime prediction routing in mobile ad hoc networks. In Proc. of IEEE wireless communications and networking conference (WCNC’03) (Vol. 2, pp. 1185–1190).
Meghanathan, N. (2008). Exploring the stability-energy consumption-delay-network lifetime tradeoff of mobile ad hoc network routing protocols. Journal of Networks, 3(2), 17–28.
Misra, A., & Banerjee, S. (2002). MRPC: maximizing network lifetime for reliable routing in wireless environments. In Proc. of IEEE wireless communications and networking conference (WCNC’02) (Vol. 2, pp. 800–806).
Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183–197.
Park, V. D., & Corson, M. S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proc. of IEEE INFOCOM (Vol. 3, pp. 1405–1413).
Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proc. of ACM SIGCOMM (pp. 234–244).
Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proc. of 2nd IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100).
Safa, H., & Mirza, O. (2010). A load balancing energy efficient clustering algorithm for MANETs. International Journal of Communication Systems, 23(4), 463–483.
Safa, H., Mirza, O., & Artail, H. (2008). A dynamic energy efficient clustering algorithm for MANETs. In Proc. of IEEE international conference on wireless and mobile computing, networking and communications (WIMOB’08) (pp. 51–56).
Song, J., Hong, F., & Guo, Y. (2005). A distributed monitoring mechanism for mobile ad hoc networks. In Proc. of the 8th international symposium on parallel architectures, algorithms and networks (ISPAN’05) (pp. 236–240).
Wang, G., Yan, J., Cong, H., & Pan, C. (2006). An adaptive assistant-aided clustering scheme for mobile ad hoc networks. In Proc. of international conference on wireless communications, networking and mobile computing (WiCOM’06) (pp. 1–4).
Wu, J., Gao, M., & Stojmenovic, I. (2001). On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks. In Proc. of international conference on parallel processing (pp. 346–354).
Xin, J., Yao-Xue, Z., Yue-Zhi, Z., & Yaya, W. (2005). A novel IDS agent distributing protocol for MANETs. In V. S. Sunderam, G. D. v. Albada, P. M. A. Sloot, J. J. Dongarra (Eds.) Lecture notes in computer science: Vol. 3515. Computational science—ICCS’05 (pp. 502–509). Berlin/Heidelberg: Springer.
Yi, P., Jiang, Y., Zhong, Y., & Zhang, S. (2005). Distributed intrusion detection for mobile ad hoc networks. In Proc. of IEEE symposium on applications and the Internet workshops (SAINT’05) (pp. 94–97).
Yu, J. Y., & Chong, P. H. J. (2006). An efficient clustering scheme for large and dense mobile ad hoc networks (MANETs). Computer Communications, 30(1), 5–16.
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proc. of the 6th annual international conference on mobile computing and networking (MobiCom’00) (pp. 275–283).
Zhang, Y., Lee, W., & Huang, Y. A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), 545–556.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported by the Korea Foundation for International Cooperation of Science & Technology (KICOS) through a grant provided by the Korean Ministry of Educational Science & Technology (MEST) in (No. 2008-00126).
Rights and permissions
About this article
Cite this article
Kim, Y., Jung, KY., Kim, TH. et al. A distributed energy-efficient clustering scheme for deploying IDS in MANETs. Telecommun Syst 52, 85–96 (2013). https://doi.org/10.1007/s11235-011-9468-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9468-6