DocumentCode :
126758
Title :
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Author :
Sumit, S. ; Mitra, Debasis ; Gupta, Deepika
Author_Institution :
Dept. of CSE/IT, Manipal Univ. Jaipur, Jaipur, India
fYear :
2014
fDate :
6-8 Feb. 2014
Firstpage :
156
Lastpage :
160
Abstract :
Mobile Ad-Hoc Networks (MANET) consist of peer-to-peer infrastructure less communicating nodes that are highly dynamic. As a result, routing data becomes more challenging. Ultimately routing protocols for such networks face the challenges of random topology change, nature of the link (symmetric or asymmetric) and power requirement during data transmission. Under such circumstances both, proactive as well as reactive routing are usually inefficient. We consider, zone routing protocol (ZRP) that adds the qualities of the proactive (IARP) and reactive (IERP) protocols. In ZRP, an updated topological map of zone centered on each node, is maintained. Immediate routes are available inside each zone. In order to communicate outside a zone, a route discovery mechanism is employed. The local routing information of the zones helps in this route discovery procedure. In MANET security is always an issue. It is possible that a node can turn malicious and hamper the normal flow of packets in the MANET. In order to overcome such issue we have used a clustering technique to separate the nodes having intrusive behavior from normal behavior. We call this technique as effective k-means clustering which has been motivated from k-means. We propose to implement Intrusion Detection System on each node of the MANET which is using ZRP for packet flow. Then we will use effective k-means to separate the malicious nodes from the network. Thus, our Ad-Hoc network will be free from any malicious activity and normal flow of packets will be possible.
Keywords :
data mining; mobile ad hoc networks; mobile computing; peer-to-peer computing; routing protocols; telecommunication security; K-means clustering method; MANET security; ZRP based MANET; ad-hoc network; clustering technique; data mining; data transmission; intrusion detection system; intrusive behavior; k-means; local routing information; malicious activity; malicious nodes; mobile ad-hoc networks; packet flow; peer-to-peer infrastructure; proactive protocols; random topology; reactive protocols; route discovery mechanism; route discovery procedure; routing data; zone routing protocol; Flowcharts; Mobile ad hoc networks; Mobile computing; Protocols; Routing; IARP; IDS effective k-means clustering; IERP; MANET; ZRP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on
Conference_Location :
Faridabad
Print_ISBN :
978-1-4799-3958-9
Type :
conf
DOI :
10.1109/ICROIT.2014.6798303
Filename :
6798303
Link To Document :
بازگشت