By Topic

A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chuan-xiang Ma ; Sch. of Math. & Comput. Sci., Hubei Univ., Wuhan ; Ze-ming Fang

Due to resource limitation, it is an optimum solution for intrusion detection in mobile ad-hoc networks (MANETs) that all nodes investigate system and user activities while a subset of network nodes are selected as monitoring nodes to monitor and detect network packets. In this paper, a novel intrusion detection architecture for energy-constrained mobile ad-hoc networks is proposed, in which the network detection module is optional. Monitoring nodes are selected by activating the network detection model to work. A selection scheme of monitoring nodes called event triggering based adaptive selection (ETBAS) is also proposed, which introduces the mechanism of monitoring states and the method of event triggering. Triggering events, for example, a node has been voted to be a monitoring node by its neighbors, the battery power of a monitoring node has consumed to a threshold, or the networks topology has changed, can activate a non-monitoring node, or make a monitoring node fall asleep. High connectivity and energy resource are balanced in ETBAS for adaptive selection scheme, which is adaptable to dynamically changing networks and enhances the network lifetime.

Published in:

Intelligent Information Technology and Security Informatics, 2009. IITSI '09. Second International Symposium on

Date of Conference:

23-25 Jan. 2009