Identifying IDS Agent Nodes Based on 3-Layered Key Management Framework for MANET

Authors

  • Marjan KUCHAKI RAFSANJANI Department of Computer Science, Shahid Bahonar University of Kerman, Kerman

Keywords:

Mobile Ad hoc Network (MANET), authentication, intrusion detection, key management, IDS agent node

Abstract

Nowadays, Mobile Ad Hoc Networks (MANETs) have become one of the most important networks in advanced technologies. However, MANETs are more vulnerable than wired and wireless networks to active and passive attacks. So, security and intrusion detection are very important in these networks. In this paper, we have presented a method of identifying IDS agent nodes in MANET. Whereas, IDS agent nodes due to monitoring activities in Intrusion Detection Systems (IDSs) need more battery energy than other nodes in the network. In the first step, our method uses a 3-layered key management framework in order to authenticate and then in the second step, nodes with higher battery power from among authorized nodes as IDS agent nodes are considered. Therefore, with this method, some authorized nodes contribute in monitoring activities and the network lifetime will be increased and also communication cost in the 3-layered key management framework is less than other frameworks, thus communication performance will be increased.

doi:10.14456/WJST.2014.30

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

N Saxena, G Tsudik and JH Yi. Efficient node admission and certificateless secure communication in short-lived MANETs. IEEE Trans. Parall. Distr. Sys. 2009; 20, 158-70.

M Yu, M Zhou and W Su. A secure routing protocol against Byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Tech. 2009; 58, 449-60.

MK Rafsanjani and A Movaghar. Identifying monitoring nodes with selection of authorized nodes in mobile ad hoc networks. World Appl. Sci. J. 2008; 4, 444-9.

MN Lima, AL Santos and G Pujolle. A survey of survivability in Mobile Ad hoc Networks. IEEE Comm. Surv. Tuto. 2009; 11, 66-77.

X Bao, T Xu and H Hou. Network intrusion detection based on support vector machine. In: Proceedings of the International Conference on Management and Service Science, Wuhan, 2009, p. 1-4.

W Yang, W Wan, L Guo and LJ Zhang. An efficient intrusion detection model based on fast inductive learning. In: Proceedings of the 6th International Conference on Machine Learning and Cybernetics, Hong Kong, 2007, p. 3249-54.

P Brutch and C Ko. Challenges in intrusion detection for wireless ad-hoc networks. In: Proceeding of the Symposium on Applications and the Internet Workshops, USA, 2003, p. 368-73.

M Kuchaki Rafsanjani, A Movaghar and F Koroupi. Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. In: Proceedings of the World Academy of Science, Engineering and Technology, Italy, 2008, p. 351-5.

Y Zhang, W Lee and Y Huang. Intrusion detection techniques for mobile wireless network. The ACM/Cluwer Wirel. Net. J. 2003; 9, 545-56.

N Nasser and Y Chen. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: Proceedings of the IEEE International Conference on Communications, Glasgow, 2007, p. 1154-9.

JT Chang, S Gundala, TS Moh and M Moh. VESS: a versatile exrensible security suite for MANET routing. In: Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2009, Victoria, BC, 2009, p. 944-50.

PR Zimmermann. The Official PGP User’s Guide. MIT Press, Cambridge, MA, 1995.

L Zhou and ZJ Haas. Securing ad hoc networks. IEEE Network Mag. 1999; 13, 24-30.

JP Hubaux, L Buttyan and S Capkun. The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM International Symposium on Mobile ad Hoc Networking and Computing, New York, 2001, p. 146-55.

S Capkun, L Buttyan and JP Hubaux. Self-organized public key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2003; 2, 52-64.

D Joshi, K Namuduri and R Pendse. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis. EURASIP J. Wireless Comm. Network. 2005; 4, 579-89.

W Stallings. Cryptography and Network Security. 4th ed. Prentice Hall, 2006.

KH Rhee, YH Park and G Tsudik. A group key management architecture for mobile ad-hoc wireless networks. J. Info. Sci. Eng. 2005; 21, 415-28.

S Bin and Y Bin. A hierarchical key management scheme for MANET. In: Proceedings of the International Conference on Communication Technology, Guilin, China, 2006, p. 1-4.

S Bin and Y Bin. The Three-layered group key management architecture for MANET. In: Proceedings of the 11th International Conference on Advanced Communication Technology, Phoenix Park, 2009; 2, 1378-81.

B Sun, K Wu and UW Pooch. Alert aggregation in Mobile Ad Hoc networks. In: Proceedings of the 2nd ACM Workshop on Wireless Security, New York, 2003, p. 69-78.

D Steme, P Balasubramanyam, D Carman, B Wilson, R Talpade, C Ko, R Balupari, CY Tseng, T Bowen, K Levitt and J Rowe. A general cooperative intrusion detection architecture for MANETs. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance, Washington, DC, 2005, p. 57-70.

JH Chang and L Tassiulas. Energy conserving routing in wireless ad-hoc networks. In: Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, 2000, p. 22-31.

H Kim, D Kim and S Kim. Life-time enhancing selection of monitoring nodes for intrusion detection in Mobile Ad Hoc Networks. Int. J. Electro. Commu. 2006; 60, 248-50.

M Kuchaki Rafsanjani, AA Khavasi and A Movaghar. An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET. In: Proceedings of the 2nd International Conference on Computer and Electrical Engineering, UAE, 2009, p. 625-9.

LM Feeney and M Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: Proceedings of the 12th Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, AK, 2001, p. 1548-57.

M Kuchaki Rafsanjani, AA Khavasi and A Movaghar. An effective approach for determining IDS agent nodes in MANET. In: Proceedings of the 3rd International Conference on Internet Technology and Applications, UK, 2009, p. 458-65.

Downloads

Published

2013-12-13

How to Cite

RAFSANJANI, M. K. (2013). Identifying IDS Agent Nodes Based on 3-Layered Key Management Framework for MANET. Walailak Journal of Science and Technology (WJST), 11(2), 79–85. Retrieved from https://wjst.wu.ac.th/index.php/wjst/article/view/622