Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 57 - Number 3
Year of Publication: 2012
Authors:
Zeba Ishaq
10.5120/9093-3126

Zeba Ishaq. Article: SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS. International Journal of Computer Applications 57(3):10-13, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Zeba Ishaq},
	title = {Article: SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {57},
	number = {3},
	pages = {10-13},
	month = {November},
	note = {Full text available}
}

Abstract

In modern era of technology wireless networks are widely used for data communication through out the world. Mobile Ad hoc Network (MANET) is one of the type in which each device works as an independent node and also as a router for forwarding data between nodes of the MANET. MANET has no centralized or authorized body to protect the communication from intruders and considered as vulnerable to attacks due to its distributed nature and lack of infrastructure. Cluster based distributed and cooperative intrusion detection system (IDS) provides security to some extent. The header node in a cluster is a key component because if compromised the whole cluster will be destroyed. We propose a system that uses two heads per cluster with cooperative IDS mechanism. These head nodes not only cooperate for finding intrusion for cluster members but also protect each other against intrusion. In result more permenent cluster will appear which give birth to more consistent network connection. The performance metric of our work is based on how smoothly and securely the cluster operates when one header is compromised. The proposed system increases the detection rate and decreases the traffic and therefore offers the efficient utilization of power in mobile nodes.

References

  • Zhang Y, Lee W. Intrusion detection in wireless ad hoc networks. Proc. of 6th Ann. Int. Conf. , (ACM MobiCom'00): Boston, MA, Aug 2000; 275-283.
  • Albers P, Camp O, et,al. Security in ad hoc networks: a general ID architecture enhancing trust based approaches. Proc. of 1st Int: April 2002; 1-12.
  • Vasudevan, Decleene B, Immerman N, et,al. Leader election algorithms for wireless ad hoc networks. In 3rd DARPA Information Survivability Conference and Exposition (DISCEX III): April 2003.
  • Krishna P, Vaidya N H, et,al. A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review: 1997; 27, (2): 49-64.
  • Krugel C, Toth T. Flexible, mobile agent based intrusion detection for dynamic networks. In European Wireless: 2002.