CFP last date
20 December 2024
Reseach Article

SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS

by Zeba Ishaq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 3
Year of Publication: 2012
Authors: Zeba Ishaq
10.5120/9093-3126

Zeba Ishaq . SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS. International Journal of Computer Applications. 57, 3 ( November 2012), 10-13. DOI=10.5120/9093-3126

@article{ 10.5120/9093-3126,
author = { Zeba Ishaq },
title = { SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 3 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number3/9093-3126/ },
doi = { 10.5120/9093-3126 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:28.664677+05:30
%A Zeba Ishaq
%T SECURE MANET using Two Head Cluster in Hierarchal Cooperative IDS
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 3
%P 10-13
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In modern era of technology wireless networks are widely used for data communication through out the world. Mobile Ad hoc Network (MANET) is one of the type in which each device works as an independent node and also as a router for forwarding data between nodes of the MANET. MANET has no centralized or authorized body to protect the communication from intruders and considered as vulnerable to attacks due to its distributed nature and lack of infrastructure. Cluster based distributed and cooperative intrusion detection system (IDS) provides security to some extent. The header node in a cluster is a key component because if compromised the whole cluster will be destroyed. We propose a system that uses two heads per cluster with cooperative IDS mechanism. These head nodes not only cooperate for finding intrusion for cluster members but also protect each other against intrusion. In result more permenent cluster will appear which give birth to more consistent network connection. The performance metric of our work is based on how smoothly and securely the cluster operates when one header is compromised. The proposed system increases the detection rate and decreases the traffic and therefore offers the efficient utilization of power in mobile nodes.

References
  1. Zhang Y, Lee W. Intrusion detection in wireless ad hoc networks. Proc. of 6th Ann. Int. Conf. , (ACM MobiCom'00): Boston, MA, Aug 2000; 275-283.
  2. Albers P, Camp O, et,al. Security in ad hoc networks: a general ID architecture enhancing trust based approaches. Proc. of 1st Int: April 2002; 1-12.
  3. Vasudevan, Decleene B, Immerman N, et,al. Leader election algorithms for wireless ad hoc networks. In 3rd DARPA Information Survivability Conference and Exposition (DISCEX III): April 2003.
  4. Krishna P, Vaidya N H, et,al. A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review: 1997; 27, (2): 49-64.
  5. Krugel C, Toth T. Flexible, mobile agent based intrusion detection for dynamic networks. In European Wireless: 2002.
Index Terms

Computer Science
Information Sciences

Keywords

IDS MANET Cluster Header Node Mobile node