Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2, Issue 4, Pages 169-191

An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks

B. M. Reshmi,1 S. S. Manvi,2 and Bhagyavati3

1Department of Information Science and Engineering, Basaveshwara Engineering College, Bagalkot, India
2Department of Electronics and Communication Engineering, Basaveshwara Engineering College, Bagalkot, 587102, India
3Department of Computer Science, Columbus State University, 4225 University Avenue, Columbus, Georgia 31907-5645, USA

Received 30 November 2006; Accepted 30 November 2006

Copyright © 2006 Hindawi Publishing Corporation. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Intrusion detection has over the last few years, assumed paramount importance within the broad realm of network security, more so in case of wireless mobile ad hoc networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based mobile wireless ad hoc network environment. The model comprises of a set of static and mobile agents, which are used to detect intrusions, respond to intrusions, and distribute selected and aggregated intrusion information to all other nodes in the network in an intelligent manner. The model is simulated to test its operation effectiveness by considering the performance parameters such as, detection rate, false positives, agent overheads, and intrusion information distribution time. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, flexibility, and customization.