Zone-based clustering for intrusion detection architecture in ad-hoc networks

被引:0
|
作者
Kim, Il-Yong [1 ]
Kim, Yoo-Sung [1 ]
Kim, Ki-Chang [1 ]
机构
[1] Inha Univ, Sch Informat & Commun Engn, Inchon, South Korea
关键词
intrusion detection architecture; ad-hoc network; clustering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clusters and put IDS on each cluster head. However traditional clustering techniques for ad-hoc network have been developed for routing purpose, and they tend to produce duplicate nodes or fragmented clusters as a result of utilizing maximum connectivity for routing. Most of recent clustering algorithm for IDS are also based on them and show similar problems. In this paper, we suggest to divide the network first into zones which are supersets of clusters and to control the clustering process globally within each zone to produce more efficient clusters in terms of connectivity and load balance. The algorithm is explained in detail and shows about 32% less load concentration in cluster heads than traditional techniques.
引用
收藏
页码:253 / 262
页数:10
相关论文
共 50 条
  • [1] EZRP:: an enhanced zone-based routing protocol for ad-hoc networks
    Koyama, A.
    Arai, J.
    Barolli, L.
    Durresi, A.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (08): : 1157 - 1170
  • [2] Guard zone-based scheduling in ad hoc networks
    Hasan, Aamir
    Ali, Ahsan
    [J]. COMPUTER COMMUNICATIONS, 2015, 56 : 89 - 97
  • [3] An enhanced zone-based routing protocol for mobile ad-hoc networks based on route reliability
    Koyama, Akio
    Honma, Yoshitaka
    Arai, Junpei
    Barolli, Leonard
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 61 - +
  • [4] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [5] Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
    Di Wu 1 Zhisheng Liu 1 Yongxin Feng 2
    [J]. 计算机工程与应用, 2004, (29) : 122 - 125
  • [6] A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    [J]. IITSI 2009: SECOND INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS, 2009, : 198 - 201
  • [7] A Novel Intrusion Detection Architecture for Energy-Constrained Mobile Ad-hoc Networks
    Ma, Chuan-xiang
    Fang, Ze-ming
    Wang, Lei-chun
    Li, Qing-hua
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 366 - +
  • [8] Host based intrusion detection architecture for mobile ad hoc networks
    Ray, Prabhudutta
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1942 - 1946
  • [9] An architecture for resilient intrusion detection in ad -hoc networks
    Al Qurashi, Mohammed
    Angelopoulos, Constantinos Marios
    Katos, Vasilios
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [10] Zone-oriented Byzantine Agreement on zone-based wireless ad-hoc network
    Cheng, Chien-Fu
    Wang, Shu-Ching
    Liang, Tyne
    [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 853 - 862