Skip to main content

Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 335))

Abstract

In this paper we reduce the communication and computation overhead involved in Leader Election for running Intrusion Detection System (IDS) for a cluster of nodes in mobile ad hoc networks using Mobile Agents. To reduce the performance overhead of IDS, a leader node is elected to handle intrusion detection service for the whole cluster. If the cluster head selection is random, it might be possible that resource consumption of the leader is higher and it might just lose all its power. Thus overall lifetime of cluster reduces to lesser than useful lifetime. It is clear that such methods have no guarantee to work. The solution requires balancing the resource consumption among all the nodes and thus increase the overall lifetime of a cluster by electing the most cost- efficient node. We will call it leader-IDS. Our contribution to the election scheme is to design an algorithm which uses mobile agents to gather resource information from all the cluster nodes and use it to elect leader in optimum and secure manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks. Pearson Education (2008)

    Google Scholar 

  2. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. MOBICOM 2000, pp. 275–283. ACM Press, Boston (2000)

    Chapter  Google Scholar 

  3. Huang, Y.-A., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003, pp. 135–147. ACM, NY (2003)

    Chapter  Google Scholar 

  4. Kachirski, O., Guha, R.: Efficient Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proc. IEEE Hawaii Int’l Conf. System Sciences, HICSS (2003)

    Google Scholar 

  5. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4), 708–721 (2008)

    Article  Google Scholar 

  6. Mohammed, N., Otrok, H., Wang, L., Debbabi, M., Bhattacharya, P.: Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Transactions on Dependable and Secure Computing 8(1) (2011)

    Google Scholar 

  7. Zeng, Chen, Z.: A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET. In: International Conference on Network Computing and Information Security (2011)

    Google Scholar 

  8. Anderegg, L., Eidenbenz, S.: Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In: Proc. ACM MobiCom (2003)

    Google Scholar 

  9. Agents, http://www.java2s.com/Article/Java/SOAservices/The_Architecture_of_Aglets_IBMs_Mobile_Java_Agents_Under_the_Hood.html

  10. Albers, P., Camp, O., Percher, J.-M., Jouga, B., Ludovic, M., Puttini, R.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proc. of the First International Workshop on Wireless Information Systems, WIS 2002, pp. 1–12 (2002)

    Google Scholar 

  11. Tripathi, A.R.: A Security Architecture for Mobile Agents in Ajanta. In: Proceedings of the 20th International Conference on Distributed Computing Systems, ICDCS 2000, pp. 402–409. IEEE Computer Society, Washington, DC (2000)

    Google Scholar 

  12. Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K.: A Cluster-Based Approach for Routing in Dynamic Networks. Proc. ACM SIGCOMM Computer Comm. Rev. (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Darji, M., Trivedi, B. (2012). Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics