An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks

Authors

  • S. Muruganandam Assistant Professor, Department of CSE, Rajalakshmi Engineering, College, Chennai
  • N. Srinivasan Professor, Department of CSE, Rajalakshmi Engineering College, Chennai
  • Anantha Sivaprakasam Professor, Department of CSE, Rajalakshmi Engineering College, Chennai

Keywords:

Encryption, Firewalls, Mobile AdHoc Network, Internet of Things, Intrusion Detection System

Abstract

A Mobile ad hoc network (MANET) is a set of wireless multi-hop network which can broadcast data over an intermediate node; these networks have been universally used and become an essential since the expansion of the Internet of Things (IoT). However, the communications on MANET are sensitive, it mostly affected by several internal or external attackers, and the research on security issues of MANET is becoming most needed recently. Malicious nodes such as Black hole attack are one of the most prominent attacks in MANET. The conventional technique for firewalls and encryption is not sufficient for securing the system. Hence an intrusion detection system must be implemented in the mobile ad hoc network. One of the various types of misbehavior a node may exhibit is selfishness. Indiscipline or selfish node wishes to preserve their resources when using the services of others and utilizing their resources. Malicious nodes that violate regulations and decrease the performance of well-behaved nodes automatically. One method for protecting selfishness in a MANET is a find and isolates method. This paper, describes a different method for detecting malicious nodes in mobile ad hoc networks with the design of Intrusion Detection and prevention schemes for improving the security of MANET. This paper proposes a dynamic algorithm for identifying malicious presence in a MANET environment and conduct experiments to check algorithm efficiency with other algorithms.

Downloads

Download data is not yet available.

References

M.Arulselvan, S.Selvakumar, Malicious node identification using quantitative intrusion detection techniques in MANET.Springer Science +Business Media,LLC,part of Springer Nature 2018,http://doi.org/10.1007/s10586-018-2418-2.

M.Islabudeen,M.K.Kavitha Devi, A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks. Springer Science +Business Media, LLC, part of Springer Nature 2020, http://doi.org//10.1007/s11277-019-07022-5.

A.R.Rajeswari,K.Kulothungan et.al, Trust Aware Svm Based Ids For Mitigating The Malicious Nodes In Manet,International Journal of Innovative Technology and Exploring Engineering(IJITEE) ISSN:2278,Volume-8 Issue-8,June,2019.

Kuldeep Singh,Karandeep Singh, Intrusion Detection and Recovery of MANET by using ACO Algorithm and Genetic Algorithm, Springer Nature Singapore pte Ltd.2018,Next-Generation Networks,Advances in Intelligent Systems and Computing 638, http://doi.org/10.1007/978-981-10-6005-2_11.

Mohamed Assia ,Abdelfettah Belghith,5 th International Conference on Ambient Systems, Networks and Technology(ANT-2014),A node quality based clustering algorithm in wireless mobile Ad Hoc networks,doi:10.1016/j.procs.2014.05.412.

Jan PAPAJ, Lubomir DOBOS, Trust Based Algorithm for Candidate Node Selection in Hybrid MANET-DTN, Information and Communication Technologies and Services Volume 12, Number: 4, 2014, Special Issue.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Hiral Vegda,Dr.Nimesh Modi, Secure and Efficient Approach to Prevent Ad hoc Network Attacks using Intrusion Detection System,Second International Conference on Intelligent Computing and Control System(ICICCS 2018) IEEE Xplore,ISBN:978-1-5386-2842-3.

Panagiotis I.Radoglou et al.Flow Anomaly Based Intrusion Detection System for Android Mobile Devices, 2017 6 th International Conference on Modern Circuits and Systems Technologies (MOCAST).978-1-5090-4386-6/17.

Spana B.Kulkarni,B.N.Yuvaraju, Trust Value Updation Algorithm for Multicast Routing Algorithm for Cluster Based MANET ,IEEE WiSPNET 2017 conference,978-1-5090-4442-9/17,IEEE.

Masood Ahmad,Abdul Hameed et al. A bio-inspired clustering in mobile adhoc networks for internet of things based on honey bee and genetic algorithm,Journal of Ambient Intelligence and Humanized Computing, http://doi.org//10.1007/s12652-018-1141-4.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Yi Yi Aung ,Myat Myat Min, A Collaborative Intrusion Detection Based on K-means and Projective Adaptive Resonance Theory,2017 13 th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery(ICNC-FSKD 2017) 978-1-5386-2165-3/17,IEEE.

Khondekar Lutful Hassan,Somnath Bera et al. Agent Based IDS Using RMBOPB Techniques in MANET,Springer Nature Singapore Pte Ltd.2017,DOI:10.1007/978-981-10-6427-2_28.

Preeti Pandey,Atul Barve, An Energy – Efficient Intrusion Detection System for MANET. Springer Nature Singapore Pte Ltd.2019.https://doi.org/10.1007/978-981-13-6351-1_10.

Prasanthi Sreekumari, Implementation of an Acknowledgment and Signature based Intrusion Detection System for MANETS. Springer Nature Switzerland AG2019. International Conference on Information Technology-Next Generations (ITNG 2019) Advances in Intelligent Systems and Computing. https://doi.org/10.1007/978-3-030- 14070-0_92.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

D.Muruganandam, J.Martin Leo Manickam, An efficient technique for mitigating stealthy attacks using MNDA in MANET, The Natural Computing Applications Forum2018. https://doi.org/10.1007/s00521-018-3634-7.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

K.Bala,S.Jothi et al. An enhanced intrusion detection system for mobile ad-hoc Network based on traffic analysis,Springer Science +Business Media,LLC,part of Springer Nature 2018. https://doi.org/10.1007/s10586-018-25459.

Paithane, P. M., & Kakarwal, D. (2022). Automatic Pancreas Segmentation using A Novel Modified Semantic Deep Learning Bottom-Up Approach. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 98–104. https://doi.org/10.18201/ijisae.2022.272

Ming-Yang Su,Kun-Lin Chiang, Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes. Springer-Verlag Berlin Heidelberg 2010,WASA2010, LNCS 6221, pp.253-260, 2010.

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Guoquan Li, Zheng Yan et al, A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network,IEEE CNS 2018-1st International Workshop on System Security and Vulnerability (SSV), 978-1-5386-4586-4/18.

General Model of Intrusion Detection System

Downloads

Published

01.10.2022

How to Cite

Muruganandam, S. ., Srinivasan, N. ., & Sivaprakasam, A. . (2022). An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. International Journal of Intelligent Systems and Applications in Engineering, 10(3), 154–160. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2151

Issue

Section

Research Article