Journal of Northeastern University ›› 2010, Vol. 31 ›› Issue (9): 1246-1249.DOI: -

• OriginalPaper • Previous Articles     Next Articles

A feasible intrusion detection mechanism in hierarchical Ad Hoc networks

Yu, Yao (1); Guo, Lei (1); Wang, Xing-Wei (1)   

  1. (1) School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
  • Received:2013-06-20 Revised:2013-06-20 Online:2010-09-15 Published:2013-06-20
  • Contact: Yu, Y.
  • About author:-
  • Supported by:
    -

Abstract: An intrusion detection mechanism was proposed for mobile agent to meet the security requirements in accordance to the hierarchical characteristics of Ad Hoc networks. In this mechanism, a typical behavior model of nodes is developed by analyzing the node's ability to deal with the messages in routing process. The cluster-head agent is used to monitor and collect the behavior information of all the members in the cluster. Then, the collected information is matched with the typical behavior model to estimate the abnormal behavior of the node, thus locating the attacking node by virtue of fuzzy method so as to take responding measures to restrict the harm of malicious nodes which are attacking the network. Simulation results showed that the intrusion detection mechanism proposed can detect the abnormalities in time and accurately in hierarchical Ad Hoc networks.

CLC Number: