Skip to main content

Advertisement

Log in

A distributed energy-efficient clustering scheme for deploying IDS in MANETs

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Cluster-based intrusion detection systems, where cluster heads (CHs) detect misbehavior of their member nodes, have been proposed in mobile ad-hoc networks (MANETs) in order to protect the network and save the energy. However, long-term survival of all nodes is more important so as not to partition the network. The extension of the network lifetime in the cluster-based IDS depends on which nodes are selected as CHs, which consume much more energy than cluster members due to monitoring them and detecting intrusions. In this paper, we propose a Distributed Energy Efficient Cluster Formation (DEECF) scheme, which exploits the expected residual energy of mobile nodes to select CHs and starts the cluster formation from leaf nodes to reduce the number of clusters. The scheme consists of the cluster construction algorithm and the cluster maintenance algorithm, both of which can be performed at each node in a distributed way without any global knowledge. We prove the correctness of the algorithms, and show that the DEECF scheme is more energy efficient than other clustering schemes by extensive simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Network simulator 2 (2011). http://www.isi.edu/nsnam/ns/.

  2. Ahmed, E., Samad, K., & Mahmood, W. (2006). Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks. In Proc. of the 5th AusCERT Asia Pacific information technology security conference (pp. 46–56).

    Google Scholar 

  3. Anantvalee, T., & Wu, J. (2006). Wireless and mobile network security, Chap. 7. In A survey on intrusion detection in mobile ad hoc networks (pp. 170–196). Berlin: Springer.

    Google Scholar 

  4. Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. New York: Wiley.

    Book  Google Scholar 

  5. Bricard-Vieu, V., & Mikou, N. (2005). Qos in MANETs using a mobility prediction-based weighted clustering algorithm. In Networking and communications (WiMob’05): Vol. 3. Proc. of IEEE international conference on wireless and mobile computing (pp. 390–396).

    Google Scholar 

  6. Brutch, P., & Ko, C. (2003). Challenges in intrusion detection for wireless ad-hoc networks. In Proc. of symposium on applications and the Internet workshops (pp. 368–373).

    Chapter  Google Scholar 

  7. Chang, J. H., & Tassiulas, L. (2000). Energy conserving routing in wireless ad-hoc networks. In Proc. of IEEE INFOCOM (Vol. 1, pp. 22–31).

    Google Scholar 

  8. Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193–204.

    Article  Google Scholar 

  9. Chiang, C. C., Kuang, W. H., Liu, W., & Gerla, M. (1997). Routing in clustered multi-hop mobile wireless networks with fading channel. In Proc. of IEEE SICON (pp. 197–211). New York: IEEE Press.

    Google Scholar 

  10. Dhurandher, S. K., & Singh, G. V. (2005). Weight based adaptive clustering in wireless ad hoc networks. In Proc. of IEEE international conference on personal wireless communications (ICPWC’05) (pp. 95–100).

    Google Scholar 

  11. Fu, Y., He, J., & Li, G. (2007). A distributed intrusion detection scheme for mobile ad hoc networks. In Proc. of 31st annual international computer software and applications conference (COMPSAC’07) (Vol. 2, pp. 75–80).

    Google Scholar 

  12. Haynes, T. W., Hedetniemi, S., & Slater, P. (1999). Domination in graphs: advanced topics. Boca Raton: CRC Press.

    Google Scholar 

  13. Huang, Y., & Lee, W. (2003). A cooperative intrusion detection system for ad hoc networks. In Proc. of the 1st ACM workshop on security of ad hoc and sensor networks (SASN’03) (pp. 135–147).

    Chapter  Google Scholar 

  14. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In The Kluwer international series in engineering and computer science: Vol. 353. Mobile computing (pp. 153–181). New York: Springer.

    Chapter  Google Scholar 

  15. Kasamatsu, D., Shinomiya, N., & Ohta, T. (2009). A broadcasting method considering battery lifetime and distance between nodes in Manet. In Proc. of the 29th IEEE international conference on distributed computing systems workshops (ICDCS’09) (pp. 406–411).

    Chapter  Google Scholar 

  16. Kim, I. Y., Kim, Y. S., & Kim, K. C. (2006). Zone-based clustering for intrusion detection architecture in ad-hoc networks. In Lecture notes in computer science: Vol. 4238. Management of convergence networks and services (pp. 253–262). Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  17. Maleki, M., Dantu, K., & Pedram, M. (2002). Power-aware source routing protocol for mobile ad hoc networks. In Proc. of the international symposium on low power electronics and design (ISLPED’02) (pp. 72–75). New York: ACM Press.

    Chapter  Google Scholar 

  18. Maleki, M., Dantu, K., & Pedram, M. (2003). Lifetime prediction routing in mobile ad hoc networks. In Proc. of IEEE wireless communications and networking conference (WCNC’03) (Vol. 2, pp. 1185–1190).

    Google Scholar 

  19. Meghanathan, N. (2008). Exploring the stability-energy consumption-delay-network lifetime tradeoff of mobile ad hoc network routing protocols. Journal of Networks, 3(2), 17–28.

    Article  Google Scholar 

  20. Misra, A., & Banerjee, S. (2002). MRPC: maximizing network lifetime for reliable routing in wireless environments. In Proc. of IEEE wireless communications and networking conference (WCNC’02) (Vol. 2, pp. 800–806).

    Google Scholar 

  21. Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183–197.

    Article  Google Scholar 

  22. Park, V. D., & Corson, M. S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proc. of IEEE INFOCOM (Vol. 3, pp. 1405–1413).

    Chapter  Google Scholar 

  23. Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proc. of ACM SIGCOMM (pp. 234–244).

    Google Scholar 

  24. Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proc. of 2nd IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100).

    Chapter  Google Scholar 

  25. Safa, H., & Mirza, O. (2010). A load balancing energy efficient clustering algorithm for MANETs. International Journal of Communication Systems, 23(4), 463–483.

    Google Scholar 

  26. Safa, H., Mirza, O., & Artail, H. (2008). A dynamic energy efficient clustering algorithm for MANETs. In Proc. of IEEE international conference on wireless and mobile computing, networking and communications (WIMOB’08) (pp. 51–56).

    Chapter  Google Scholar 

  27. Song, J., Hong, F., & Guo, Y. (2005). A distributed monitoring mechanism for mobile ad hoc networks. In Proc. of the 8th international symposium on parallel architectures, algorithms and networks (ISPAN’05) (pp. 236–240).

    Chapter  Google Scholar 

  28. Wang, G., Yan, J., Cong, H., & Pan, C. (2006). An adaptive assistant-aided clustering scheme for mobile ad hoc networks. In Proc. of international conference on wireless communications, networking and mobile computing (WiCOM’06) (pp. 1–4).

    Chapter  Google Scholar 

  29. Wu, J., Gao, M., & Stojmenovic, I. (2001). On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks. In Proc. of international conference on parallel processing (pp. 346–354).

    Google Scholar 

  30. Xin, J., Yao-Xue, Z., Yue-Zhi, Z., & Yaya, W. (2005). A novel IDS agent distributing protocol for MANETs. In V. S. Sunderam, G. D. v. Albada, P. M. A. Sloot, J. J. Dongarra (Eds.) Lecture notes in computer science: Vol. 3515. Computational science—ICCS’05 (pp. 502–509). Berlin/Heidelberg: Springer.

    Google Scholar 

  31. Yi, P., Jiang, Y., Zhong, Y., & Zhang, S. (2005). Distributed intrusion detection for mobile ad hoc networks. In Proc. of IEEE symposium on applications and the Internet workshops (SAINT’05) (pp. 94–97).

    Google Scholar 

  32. Yu, J. Y., & Chong, P. H. J. (2006). An efficient clustering scheme for large and dense mobile ad hoc networks (MANETs). Computer Communications, 30(1), 5–16.

    Article  Google Scholar 

  33. Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proc. of the 6th annual international conference on mobile computing and networking (MobiCom’00) (pp. 275–283).

    Google Scholar 

  34. Zhang, Y., Lee, W., & Huang, Y. A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), 545–556.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuna Kim.

Additional information

This work was supported by the Korea Foundation for International Cooperation of Science & Technology (KICOS) through a grant provided by the Korean Ministry of Educational Science & Technology (MEST) in (No. 2008-00126).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, Y., Jung, KY., Kim, TH. et al. A distributed energy-efficient clustering scheme for deploying IDS in MANETs. Telecommun Syst 52, 85–96 (2013). https://doi.org/10.1007/s11235-011-9468-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9468-6

Keywords

Navigation