DocumentCode :
2764473
Title :
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks
Author :
Sen, Jaydip
Author_Institution :
Innovation Lab., Tata Consultancy Services Ltd., Kolkata, India
fYear :
2010
fDate :
28-30 July 2010
Firstpage :
202
Lastpage :
207
Abstract :
Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks due their features of open medium, dynamically changing topologies, reliance on co-operative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. In this paper, we present a cooperative, distributed intrusion detection architecture based on clustering of the nodes that addresses the security vulnerabilities of the network and facilitates accurate detection of attacks. The architecture is organized as a dynamic hierarchy in which the intrusion data is acquired by the nodes and is incrementally aggregated, reduced in volume and analyzed as it flows upwards to the cluster-head. The cluster-heads of adjacent clusters communicate with each other in case of cooperative intrusion detection. For intrusion related message communication, mobile agents are used for their efficiency in lightweight computation and suitability in cooperative intrusion detection. Simulation results show effectiveness and efficiency of the proposed architecture.
Keywords :
ad hoc networks; mobile agents; pattern clustering; protocols; security of data; telecommunication computing; telecommunication network topology; telecommunication security; telecommunication traffic; centralized monitoring points; cluster heads; clustered wireless ad hoc networks; co-operative algorithms; distributed intrusion detection architecture; infrastructure protocols; intermittent wireless communications; intrusion related message communication; mobile agents; network security; node clustering; Cluster; Denial of service attack; Intrusion detection; Security; Wireless ad hoc networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence, Communication Systems and Networks (CICSyN), 2010 Second International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4244-7837-8
Electronic_ISBN :
978-0-7695-4158-7
Type :
conf
DOI :
10.1109/CICSyN.2010.51
Filename :
5615975
Link To Document :
بازگشت