Abstract
In this paper, we propose a distributed hierarchical intrusion detection system for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is used to determine the duration for which a particular node can support a network monitoring node. We propose an iterative power-aware power-optimal solution to identifying nodes for distributed agent-based intrusion detection. The advantages that our approach entails are several, not least of which is the inherent flexibility SPAID provides. We consider minimally mobile networks in this paper, and considerations apt for mobile ad hoc networks and issues related to dynamism are earmarked for future research. Comprehensive simulations were carried out to analyze and clearly delineate the variations in performance with changing density of wireless networks, and the effect of parametric variations such as hop-radius.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system, Technical report, Computer Science Department, University of New Mexico (1990)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks Special Issue on Network Security (November 1999)
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09 (2002)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications, WMCSA (2002)
Kachirski, O., Guha, R.: Efficient Intrusion Detection using Multiple Sensors in Wireless Ad Hoc Networks. In: 36th Annual Hawaii International Conference on System Sciences (HICSS 2003) - Track 2, January 6-9 (2003)
Dasgupta, D., Brian, H.: Mobile Security Agents for Network Traffic Analysis. In: Proceedings of DARPA Information Survivability Conference & Exposition II (2001)
Tao, J., Ji-ren, L., Yang, Q.: The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent. In: Proceedings of 36th International Conference on Technology of Object-Oriented Languages and Systems (2000)
Bernardes, M.C., Moreira, E.S.: Implementation of an Intrusion Detection System based on Mobile Agents. In: Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158–164 (2000)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom, pp. 275–283 (2000)
Perrig, A., Hu, Y.C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks. Technical Report TR01-384, Department of Computer Science, Rice University (2001)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Routing Protocol Resilent to Byzantine Failures. In: ACM Workshop on Wireless Security, WiSe (2002)
Bhargava, S., Agrawal, D.P.: Security enhancements in aodv protocol for wireless ad hoc networks. In: Vehicular Technology Conference (2001)
Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile AdHoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)
Deng, H., Zeng, Q.A., Agrawal, D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC 2003), Orlando (2003)
Feeney, L.M., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proceedings of IEEE INFOCOM (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Srinivasan, T., Seshadri, J., Jonathan, J.B.S., Chandrasekhar, A. (2005). A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_18
Download citation
DOI: https://doi.org/10.1007/11534310_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)