Abstract

Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.

Highlights

  • Mobile ad hoc networks (MANETs) are self-organizing network architectures in which a collection of mobile nodes with wireless interfaces may form a temporary network without the aid of any established infrastructure or centralized administration

  • Wireless ad hoc networks have brought about a paradigm shift in the way we think about intrusion detection

  • We need to rethink intrusion detection methods for these networks based on their characteristics

Read more

Summary

Introduction

Mobile ad hoc networks (MANETs) are self-organizing network architectures in which a collection of mobile nodes with wireless interfaces may form a temporary network without the aid of any established infrastructure or centralized administration. The hosts in MANETs are free to move randomly and organize themselves arbitrarily; thereby causing dynamic network topology. This allows for greater mobility and dynamic allocation of node’s structures [1]. Wireless ad hoc networks find application in military operations so that planes, tanks, and moving personnel can communicate. Rescue missions and emergency situations can use such networks. Other examples include virtual class rooms and conferences where in people can set up a network on the fly through their laptops, PDA’s, and other mobile devices

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call