Communications of the ACM
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
Implementation of an Intrusion Detection System Based on Mobile Agents
PDSE '00 Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems
The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent
TOOLS '00 Proceedings of the 36th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-Asia'00)
Power-aware wireless mobile ad hoc networks
The handbook of ad hoc wireless networks
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Towards optimal sleep scheduling in sensor networks for rare-event detection
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.02 |
Ad hoc wireless network with their changing topology and distributed nature are more prone to intruders. The network monitoring functionality should be in operation as long as the network exists with nil constraints. The efficiency of an Intrusion detection system in the case of an ad hoc network is not only determined by its dynamicity in monitoring but also in its flexibility in utilizing the available power in each of its nodes. In this paper we propose a hybrid intrusion detection system, based on a power level metric for potential ad hoc hosts, which is used to monitoring node. Power -aware hybrid intrusion detection system focuses on the available power level in each of the nodes and determines the network monitors. Power awareness in the network results in maintaining power for network monitoring, with monitors changing often, since it is an iterative power-optimal solution to identify nodes for distributed agent-based intrusion detection. The advantage that this approach entails is the inherent flexibility it provides, by means of considering only fewer nodes for re-establishing network monitors. The detection of intrusions in the network is done with the help of Cellular Automata (CA). The CA's classify a packet routed through the network either as normal or an intrusion. The use of CA's enable in the identification of already occurred intrusions as well as new intrusions.