Efficient clustering approach for intrusion detection in adhoc networks
Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Proceedings of Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, IEEE, NED University of Engineering and Technology, Karachi, pp. 1-6.
Mobile ad-hoc networks (MANETs) are temporary
wireless networks useful in emergency rescue services,
battlefields operations, mobile conferencing and a variety of
other useful applications. Due to dynamic nature and lack of
centralized monitoring points, these networks are highly
vulnerable to attacks. Intrusion detection systems (IDS)
provide audit and monitoring capabilities that offer the local
security to a node and help to perceive the specific trust level
of other nodes. We take benefit of the clustering concept in
MANETs for the effective communication between nodes,
where each cluster involves a number of member nodes and is
managed by a cluster-head. It can be taken as an advantage
in these battery and memory constrained networks for the
purpose of intrusion detection, by separating tasks for the
head and member nodes, at the same time providing
opportunity for launching collaborative detection approach.
The clustering schemes are generally used for the routing
purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting
intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||Mobile Adhoc Networks, Cluster, Intrusion Detection|
|Subjects:||Australian and New Zealand Standard Research Classification > TECHNOLOGY (100000) > COMMUNICATIONS TECHNOLOGIES (100500) > Wireless Communications (100510)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright 2005 IEEE|
|Copyright Statement:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Deposited On:||29 Jul 2010 07:57|
|Last Modified:||11 Aug 2011 03:23|
Repository Staff Only: item control page