Cluster-Based Intrusion Detection System (CIDS) for Enhancing Security in Mobile Ad Hoc Networks (MANETs)
Abstract
Mobile Ad-hoc Network (MANET) various mobile nodes moves from one location to another location dynamically with in transmission range. MANETs are popular for critical applications like military use or disaster recovery because of the nodes' capacity to self-configure. Most of the developed protocols assume that every nodes in the network are mutual, and do not address any security issue. To adjust to such development, it is essential to address its probable security issues. The nature of dynamic topology in mobile ad hoc networks raises serious security concerns. In order to choose the leader nodes or cluster head dynamically depending on store capacity and power support, we have described the design and testing of dynamic cluster-based intrusion detection systems (IDS) in this technical research study. Another maximum forward capacity leader node is chosen based on the aforementioned resource limits in the event that a specific organizer node abruptly leaves the transmission range. Compared to other networks, MANET is more susceptible to attacks, and different types of attacks are limited to the network's functionality. MARS4, a hybrid cryptographic technique that combines the RSA and MAJE4 algorithms, is used to securely transmit data over the MANET using the Dynamic Source Routing (DSR) routing protocol. The proposed system is implemented and analyzed using Network Simulator (NS2). In addition to offering secure transmission, our suggested hybrid cryptography lowers routing overhead, increases packet delivery ratio and throughput, and efficiently uses bandwidth.
References
Sarika Patil, et al “A Survey on IDS Techniques to Detect Misbehavior Nodes in mobile ad-hoc network” in International Journal of Computer Science and Information Technologies, Vol. 5, no. 3, pp. 2783-2787, 2014.
Elhadi M. Shakshuki, et al “EAACK A Secure Intrusion Detection System for MANETS” IEEE Transaction on Industrial Electronics, vol. 60, no. 3, 2013.
Kirti Nahak, et al “Security and Privacy issues in high level MANET protocol” International Journal of science and research, vol. 2, pp.1-7, 2013.
Ismail Butun, et al “Survey of intrusion detection System in wireless Sensor Networks” in IEEE Communications survey and tutorials, pp. 1-17, 2012.
Rusha Nandy, et al “Study of various attacks in MANET and Elaborative discussion of Rushing attack on DSR with clustering scheme” international Journal Advanced networking and Applications, vol. 3, pp. 1035-1043, 2011.
Mike Burmester, et al “On the Security of Route Discovery in MANETs” IEEE transaction on mobile computing, vol. 10, pp. 1-9, 2011.
B. Pahlevanzadeh, et al “Cluster-Based Distributed Hierarchical IDS for MANETs” in International Conference on Network Applications, Protocols and Services, pp. 1-7, 2008.
Jane Y. Yu, et al “A Survey of clustering schemes for Mobile Ad-hoc Networks” IEEE communications surveys and tutorials, vol. 7, no.1, pp. 32-48, 2005.
Yang, et al “Security in mobile ad-hoc Network: challenges and solutions” IEEE wireless Communications, pp. 38-47, 2004.
Yian Huang, et al “A Cooperative intrusion detection System for Ad Hoc Networks” Proceeding of the 1st ACM workshop on security of ad-hoc and sensor networks, pp. 135-147, 2003.
Refbacks
- There are currently no refbacks.