An energy-based weight selection algorithm of monitor node in MANETs

Aiming to solve the problem of security monitor node selection in MANETs, this paper presents an energy-based weight selection algorithm of monitor node. In the scheme, on the one hand, we consider the mutual information as the factor of selecting monitor nodes according to the topological position of the node. On the other hand, the energy consumption of the node is calculated according to the node's energy consumption model, and we consider the residual energy as the factor of selecting monitor nodes. Finally, we consider the mutual information and the residual energy synthetically to calculate the weight of the node by entropy weight method, so as to select monitor nodes. The simulation result shows that the proposed method can reduce the monitoring overhead, improve the network performance, prolong the lifetime and improve the security of networks.

[1]  Keqiu Li,et al.  Heterogeneous ad hoc networks: Architectures, advances and challenges , 2017, Ad Hoc Networks.

[2]  Sunil Kumar,et al.  Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges , 2016, Secur. Commun. Networks.

[3]  M. P. Sebastian,et al.  (k, r)-Dominating set-based, weighted and adaptive clustering algorithms for mobile ad hoc networks , 2011, IET Commun..

[4]  Dae-Won Kim,et al.  Convex optimization approach for multi-label feature selection based on mutual information , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[5]  Evangelos P. Markatos,et al.  LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System , 2016, IEEE Transactions on Emerging Topics in Computing.

[6]  Riccardo Muradore,et al.  Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.

[7]  Alan Holt,et al.  Energy consumption of mobile agents in a wireless ad hoc network environment , 2013, IET Networks.

[8]  Ing-Ray Chen,et al.  Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks , 2013, IEEE Transactions on Network and Service Management.

[9]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[10]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[11]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[12]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[13]  Tae-Hyung Kim,et al.  A distributed energy-efficient clustering scheme for deploying IDS in MANETs , 2013, Telecommun. Syst..