Nothing Special   »   [go: up one dir, main page]

Skip to main content

A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

Abstract

In this paper, we propose a distributed hierarchical intrusion detection system for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is used to determine the duration for which a particular node can support a network monitoring node. We propose an iterative power-aware power-optimal solution to identifying nodes for distributed agent-based intrusion detection. The advantages that our approach entails are several, not least of which is the inherent flexibility SPAID provides. We consider minimally mobile networks in this paper, and considerations apt for mobile ad hoc networks and issues related to dynamism are earmarked for future research. Comprehensive simulations were carried out to analyze and clearly delineate the variations in performance with changing density of wireless networks, and the effect of parametric variations such as hop-radius.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system, Technical report, Computer Science Department, University of New Mexico (1990)

    Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks Special Issue on Network Security (November 1999)

    Google Scholar 

  3. Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09 (2002)

    Google Scholar 

  4. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications, WMCSA (2002)

    Google Scholar 

  5. Kachirski, O., Guha, R.: Efficient Intrusion Detection using Multiple Sensors in Wireless Ad Hoc Networks. In: 36th Annual Hawaii International Conference on System Sciences (HICSS 2003) - Track 2, January 6-9 (2003)

    Google Scholar 

  6. Dasgupta, D., Brian, H.: Mobile Security Agents for Network Traffic Analysis. In: Proceedings of DARPA Information Survivability Conference & Exposition II (2001)

    Google Scholar 

  7. Tao, J., Ji-ren, L., Yang, Q.: The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent. In: Proceedings of 36th International Conference on Technology of Object-Oriented Languages and Systems (2000)

    Google Scholar 

  8. Bernardes, M.C., Moreira, E.S.: Implementation of an Intrusion Detection System based on Mobile Agents. In: Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158–164 (2000)

    Google Scholar 

  9. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom, pp. 275–283 (2000)

    Google Scholar 

  10. Perrig, A., Hu, Y.C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks. Technical Report TR01-384, Department of Computer Science, Rice University (2001)

    Google Scholar 

  11. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Routing Protocol Resilent to Byzantine Failures. In: ACM Workshop on Wireless Security, WiSe (2002)

    Google Scholar 

  12. Bhargava, S., Agrawal, D.P.: Security enhancements in aodv protocol for wireless ad hoc networks. In: Vehicular Technology Conference (2001)

    Google Scholar 

  13. Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile AdHoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)

    Google Scholar 

  14. Deng, H., Zeng, Q.A., Agrawal, D.P.: SVM-based Intrusion Detection System for Wireless Ad Hoc Networks. In: Proceedings of the IEEE Vehicular Technology Conference (VTC 2003), Orlando (2003)

    Google Scholar 

  15. Feeney, L.M., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proceedings of IEEE INFOCOM (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Srinivasan, T., Seshadri, J., Jonathan, J.B.S., Chandrasekhar, A. (2005). A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_18

Download citation

  • DOI: https://doi.org/10.1007/11534310_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics