A novel IDS agent distributing protocol for MANETs

  • Authors:
  • Jin Xin;Zhang Yao-Xue;Zhou Yue-Zhi;Wei Yaya

  • Affiliations:
  • Key Laboratory of Pervasive Computing, Department of Computer Science & Technology, Tsinghua University, Beijing, China;Key Laboratory of Pervasive Computing, Department of Computer Science & Technology, Tsinghua University, Beijing, China;Key Laboratory of Pervasive Computing, Department of Computer Science & Technology, Tsinghua University, Beijing, China;Key Laboratory of Pervasive Computing, Department of Computer Science & Technology, Tsinghua University, Beijing, China

  • Venue:
  • ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) is becoming an exciting and important technology in very recent years, because the intrusion prevention techniques can not satisfy the security requirements in mission critical systems. The proposed IDS architecture can be divided into two categories by the distributing form of IDS agents: fully distributed IDS and cluster-based IDS. The former has a high detection ratio, but it also consumes a cascade of energy. The latter has considered energy saving, but some hidden troubles of security exist in it. In this paper, we have proposed a novel IDS Agent Distributing (IAD) protocol for distributing IDS agents in MANETs. IAD protocol divides the whole network into several zones, selects a node subset from each zone, and runs IDS agent on the node in this subset. At the same time, IAD protocol can rectify the number of nodes running IDS agent according to the threat level of the network. Compared with the scheme that each node runs its own IDS, our proposed scheme is more energy efficient while maintaining the same level of detection rate. While compared with the cluster-based IDS scheme, our scheme is more flexible when facing the emergent situations. Simulation results show that our scheme can effectively balance the security strength and energy consuming in practice.