Energy Efficient IDS Node Distribution Algorithm using Minimum Spanning Tree in MANETs

  • 투고 : 2016.12.19
  • 심사 : 2016.12.29
  • 발행 : 2016.12.31

초록

In mobile ad hoc networks(MANETs), all the nodes in a network have limited resources. Therefore, communication topology which has long lifetime is suitable for nodes in MANETs. And MANETs are exposed to various threats because of a new node which can join the network at any time. There are various researches on security problems in MANETs and many researches have tried to make efficient schemes for reducing network power consumption. Power consumption is necessary to secure networks, however too much power consumption can be critical to network lifetime. This paper focuses on energy efficient monitoring node distribution for enhancing network lifetime in MANETs. Since MANETs cannot use centralized infrastructure such as security systems of wired networks, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method to cover all the nodes in a network and enhance the network lifetime. Simulation results show that the proposed algorithm has better performance in comparison with the existing algorithms.

키워드

참고문헌

  1. P. Bergamo, A. Giovanardi, A. Travasoni, D. Maniezzo, G. Mazzini, and M. Zorzi, "Distributed power control for energy efficient routing in ad hoc networks," in Proc. ACM/Kluwer WINET, Vol. 10, No. 1, Jan. 2004.
  2. M. Cardei, J. Wu, and S. Yang, "Topology control in ad hoc wireless networks using cooperative communication," IEEE Transaction on Mobile Computing, Vol. 5, No. 6, 2006.
  3. S. Zarifzadeh, N. Yazdani, and A. Nayyeri, "Energy-efficient topology control in wireless ad hoc networks with selfish nodes," Computer Networks, Vol. 56, No. 2, pp. 902-914, 2012. https://doi.org/10.1016/j.comnet.2011.10.025
  4. R. E. N. Moraes, and C. C. Ribeiro, "Power optimization in ad hoc wireless network topology control with biconnectivity requirements," Computers & Operations Research, Vol. 40, pp. 3188-3196, 2013. https://doi.org/10.1016/j.cor.2012.09.004
  5. Y. Lee, S. Kim, T. V. Duc, and K. Kim, "Sampling based network flooding attack detection/prevention system for SDN," KISM Smart Media Journal, Vol. 4, No. 4, pp. 24-32, 2015.
  6. O. Kachirski, and R. Guha, "Effective intrusion detection using multiple sensors in wireless ad hoc networks," in Proc. of the International Conference on System Sciences, pp. 57-64, 2003.
  7. H. Kim, D. Kim, and S. Kim, "Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks," International Journal of Electronics and Communications, Vol. 60, pp. 248-250, 2006. https://doi.org/10.1016/j.aeue.2005.05.012
  8. J. H. Chang, and L. Tassiulas, "Maximum lifetime routing in wireless sensor networks," IEEE/ACM Transactions on Networking, Vol. 12, No. 4, 2004.
  9. X. H. Lin, Y. K. Kwok, and V. K. N. Lau, "A new power control approach for IEEE 802.11 ad hoc networks," IEEE PIMRC, 2003.
  10. R. G. Gallager, P. A. Humblet, and P. M. Spira, "A distributed algorithm for minimum-weight spanning trees," ACM Transactions on Programming Languages and Systems, Vol. 5, No. 1, pp. 66-77, Jan. 1983. https://doi.org/10.1145/357195.357200
  11. A. Vahdat and D. Becker, "Epidemic routing for partially connected ad hoc networks," Technical Report CS-200006, Department of Computer Science, Duke University, Durham, NC, 2000.