An Secured Intrusion Detection System Integrated with the Conditional Random Field For the Manet Network

Authors

  • Burhan R. Rexhepi Accounting Lecturer, MBE, UBT College - Higher Education Institution.
  • Avneesh Kumar Professor, Department of Computer Application,Galgotias University, Greater Noida, Uttar Pradesh, India.
  • M. S. Gowtham Associate professor, ECE, Karpagam institute of technology, Coimbatore, Tamil Nadu, India.
  • R. Rajalakshmi ECE, Panimalar engineering College, Chennai, Tamil Nadu, India.
  • Divya Paikaray Assistant Professor, School of Engg.&IT, ARKA JAIN University, Jamshedpur, Jharkhand, India.
  • Pronab Kumar Adhikari Assistant Professor, (Ajay Kumar Garg Engineering College, Ghaziabad), India.

Keywords:

Conventional Random Field, Intrusion Detection System, MANET, Security, DSR protocol

Abstract

MANET is a wireless network that lacks infrastructural support. Most operations they perform are coordinated between nodes because of their limited transmission range. Assess the secure MANET routing protocol in a malicious environment. However, in the MANET environment security is an important constraint that affects the data transmission rate and cause data loss. This paper developed an Intrusion Detection System Conditional RandomField (IDS – CRF) model for security. The developed model uses the hashing function integrated with the Conditional Random Field model. The IDS – CRF model uses the label sequences for data security in the MANET environment. The model uses the DSR protocol with the discriminative field to process the secure data in the MANET. The proposed IDS-CRF model uses the hashing function for improved data transmission security in the MANET environment. The performance of the proposed IDS – CRF model is comparatively examined with the conventional DSR protocol. The comparative analysis expressed that the proposed IDS – CRF model achieves the ~4% reduction in the delay and ~2% reduction in the routing overhead. Similarly, the proposed IDS – CRF model achieves the ~4% reduced energy consumption. In terms of the Packet delivery ratio and throughput the proposed IDS – CRF model achieves the ~4% - ~6% improved performance than DSR model.

Downloads

Download data is not yet available.

References

Rathish, C. R., Karpagavadivu, K., Sindhuja, P., & Kousalya, A. (2021). A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Information Technology and Control, 50(1), 45-54.

Bandecchi, S., & Dascalu, N. (2021). Intrusion Detection Scheme in Secure Zone Based System. Journal of Computing and Natural Science, 19-25.

Chawla, K., Gill, J., & Singh, M. (2021). Comprehensive Survey of IDS Techniques in Mobile Ad Hoc Network (MANET). Soft Computing for Intelligent Systems, 435-449.

Gandage, S. C. (2021). AN EFFICIENT REVIEW OF IDS IN MANET USING PSO. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(12), 4873-4879.

Khalifa, M. M., Ucan, O. N., & Alheeti, K. M. A. (2021, December). New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques. In 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI) (pp. 1-6). IEEE.

Chawhan, M. D., Karmarkar, K., Almelkar, G., Borkar, D., Kulat, K. D., & Neole, B. (2022, April). Identification and prevention of Gray hole attack using IDS mechanism in MANET. In 2022 10th International Conference on Emerging Trends in Engineering and Technology-Signal and Information Processing (ICETET-SIP-22) (pp. 1-6). IEEE.

Gao, X., Du, W., Liu, W., Wu, R., & Zhan, F. (2020, December). A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 1010-1015). IEEE.

Brindha, V., Karthikeyan, T., & Manimegalai, P. (2019). Fuzzy enhanced secure multicast routing for improving authentication in MANET. Cluster computing, 22(4), 9615-9623.

MOHINDRA, A. R., & GANDHI, C. (2021). A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak Journal of Science and Technology (WJST), 18(6), 8987-18.

Kaur, I., & Rao, A. L. N. (2013). Adaptive group key management in mobile ad-hoc networks (MANETs). International Journal of Computer Applications, 70(11).

Kumar, A., & Aggarwal, A. (2012, February). Performance analysis of MANET using elliptic curve cryptosystem. In 2012 14th International Conference on Advanced Communication Technology (ICACT) (pp. 201-206). IEEE.

MOHINDRA, A. R., & GANDHI, C. (2021). A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak Journal of Science and Technology (WJST), 18(6), 8987-18.

Wilson, A. J., & Radhamani, A. S. (2022). Real time flood disaster monitoring based on energy efficient ensemble clustering mechanism in wireless sensor network. Software: Practice and Experience, 52(1), 254-276.

Asaamoning, G., Mendes, P., & Magaia, N. (2021). A Dynamic Clustering Mechanism With Load-Balancing for Flying Ad Hoc Networks. IEEE Access, 9, 158574-158586.

Huang, C. M., Dao, D. T., & Mai, C. M. (2017, January). Location-Based Service (LBS) data sharing using the k-member-limited clustering mechanism over the 4G and Wi Fi hybrid wireless mobile networks. In 2017 International Conference on Information Networking (ICOIN) (pp. 526-531). IEEE.

Anil, G. N. (2021, April). Multi-level Trust Modelling to Resist Impact of Routing Attacks on Reliable Data/Communication Transactions in MANET-IoT Ecosystem. In Computer Science On-line Conference (pp. 196-205). Springer, Cham.

Flow chart of IDS - CRF

Downloads

Published

04.02.2023

How to Cite

Rexhepi, B. R. ., Kumar, A. ., Gowtham, M. S. ., Rajalakshmi, R. ., Paikaray, D. ., & Adhikari, P. K. . (2023). An Secured Intrusion Detection System Integrated with the Conditional Random Field For the Manet Network. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 14–21. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2526

Issue

Section

Research Article