Ranking Based Security Scheme with Attack Detection and Improved Network Security

Authors

  • Rajesh B. Walde Assistant Professor, G B Pant DSEU Okhla Campus III, New Delhi, India
  • Om Prakash Assistant Professor, Department of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India. https://orcid.org/0000-0001-7599-9873
  • M. Sunil Kumar Professor and programme Head, Department of CSE, School of computing, Mohan Babu University, Tirupati, Andhra Pradesh, India
  • Bipin Sule Professor, Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune, India. https://orcid.org/0000-0003-1409-2156
  • Khan Vajid Nabilal Associate Professor, Computer Engineering, KJ College of Engineering and Management Research, Maharashtra, India. https://orcid.org/0000-0002-0999-9776
  • Usha C. Pawar Assistant Professor, Mechanical Engineering, Datta Meghe College of Engineering, Airoli, Navi Mumbai, Maharashtra, India. https://orcid.org/0000-0002-6516-5354

Keywords:

MANET, Anomaly Score, Ranking, Attacks, network security

Abstract

: In the diverse environment anomaly detection significant challenge for the efficient analysis of the data traffic monitoring, medical domain, transaction of financial data, web log, domain for transportation, wireless mobile network and so on. Wireless network comprises of the different factors such as ease of use and reduced running cost in the network. MANET network comprises of the infrastructure less, auto configured, dynamic topology and central administration in the network node. This paper concentrated on the examination of the challenges in the MANET attack security challenges and proposed an anomaly detection scheme. The proposed anomaly detection scheme incorporates the scoring procedure for the anomaly detection in the network. The anomaly detection score computes the ranking values in the MANET network for the analysis. The developed ranking-based anomaly detection scheme is defined as the Ranking Anomaly Score (RAS). The performance of the RAS model is evaluated in terms of throughput, Packet delivery rate (PDR) and end -to-end delay. The performance of the proposed RAS model is comparatively examined with the existing Hashing, AODV and RSA. The comparative analysis expressed that proposed RAS model achieves the maximum throughput of 1600 bits/sec, maxima PDR is 98% and end-to-end delay is measured as 14ms. Through analysis it is observed that proposed RAS model achieves improved performance compared with the conventional technique.

Downloads

Download data is not yet available.

References

Jim, L. E., Islam, N., & Gregory, M. A. (2022). Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes. Computers & Security, 113, 102538.

Banerjee, B., &Neogy, S. (2021, December). A brief overview of security attacks and protocols in MANET. In 2021 IEEE 18th India Council International Conference (INDICON) (pp. 1-6). IEEE.

Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., &Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEE Access, 9, 120996-121005.

Arappali, N., & Rajendran, G. B. (2021). MANET security routing protocols based on a machine learning technique (Raspberry PIs). Journal of Ambient Intelligence and Humanized Computing, 12(6), 6317-6331.

Kowsigan, M., Rajeshkumar, J., Baranidharan, B., Prasath, N., Nalini, S., & Venkatachalam, K. (2021). A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the MANET. Wireless Personal Communications, 1-21.

Rathish, C. R., Karpagavadivu, K., Sindhuja, P., &Kousalya, A. (2021). A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Information Technology and Control, 50(1), 45-54.

Tu, J., Tian, D., & Wang, Y. (2021). An active-routing authentication scheme in MANET. IEEE Access, 9, 34276-34286.

Simpson, S. V., & Nagarajan, G. (2022). Security challenges and attacks in MANET-IoT systems. In Enterprise Digital Transformation (pp. 159-201). Auerbach Publications.

Sivapriya, N., & Mohandas, R. (2022). Analysis on Essential Challenges and Attacks on MANET Security Appraisal. JOURNAL OF ALGEBRAIC STATISTICS, 13(3), 2578-2589.

Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. Wireless Personal Communications, 121(1), 503-526.

Ponnusamy, M. (2021). Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(9), 2404-2410.

Das, M. V., Premchand, P., & Raju, L. R. (2021). Security Enhancing based on Node Authentication and Trusted Routing in Mobile Ad Hoc Network (MANET). Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(14), 5199-5211.

Ramphull, D., Mungur, A., Armoogum, S., &Pudaruth, S. (2021, May). A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In 2021 5th international conference on intelligent computing and control systems (ICICCS) (pp. 204-211). IEEE.

Vidhya Lakshmi, G., & Vaishnavi, P. (2022). An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution. Wireless Personal Communications, 124(1), 333-348.

Sharma, R. S., Keswani, B., & Goyal, D. (2022). Analysis of routing and security issues in OLSR protocol for video streaming over MANET. Journal of Discrete Mathematical Sciences and Cryptography, 1-9.

Korir, F. C., & Cheruiyot, W. (2022). A survey on security challenges in the current MANET routing protocols. Global Journal of Engineering and Technology Advances, 12(01), 078-091.

Flow Chart for RAS

Downloads

Published

04.02.2023

How to Cite

Walde, R. B. ., Prakash, O. ., Kumar, M. S. ., Sule, B. ., Nabilal, K. V. ., & Pawar, U. C. . (2023). Ranking Based Security Scheme with Attack Detection and Improved Network Security. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 35–41. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2529

Issue

Section

Research Article

Most read articles by the same author(s)