Enhanced replica detection scheme for efficient analysis of intrusion detection in MANET

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Nowadays, detection scheme of intrusion is placing a major role for efficient access and analysis in Mobile Ad-hoc network (MANET). In the past, the detection scheme of Intrusion was used to identify the efficiency of the network and in maximum systems it performs with huge rate of false alarm. In this paper, an Effective approach of the Enhanced Replica Detection scheme (ERDS) based on Sequential Probability Ratio Test (SPRT) is proposed to detect the malicious actions and to have a secure path without claim in an efficient manner. Also, provides strategies to avoid attacker and to provide secure communication. In order to have an efficient analysis of intrusion detection the proposed approach is implemented based on the anomaly. To achieve this, the detection scheme is established based on SPRT and demonstrated the performances of detection with less claim. The simulation results of control overhead, packet delivery ratio, efficient detection, energy consumption and average claims are carried out for the analysis of performance to show the improvement than the existing by using the network simulator tool. Also, the performance of the proposed system illustrated the detection of intrusion in the normal and attacker states of the network.


  • Keywords


    ERDS; Detection Scheme; MANET; Detection Efficiency; Delay; Network Lifetime.

  • References


      [1] Tao Shu and Marwan Krunz, “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 4, APRIL 2015

      [2] Ayesha Taranum, Manju N, Tejaswini R M, “RAACK-Reinforce Adaptive Acknowledgement A Secure Intrusion Detection System for MANETs”, International Journal of Computer Science and Information Technology Research, Vol.2, Issue 2, 2014, pp.283-296.

      [3] Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani and Matthias Hollick, “Lightweight energy consumption-based intrusion detection system for wireless sensor networks”, International Journal of Information Security, Springer, 2014, pp.1-8.

      [4] Pu Cheng, Minghua Zhu, Xianzhong Liu, “Distributed T-Distribution-Based Intrusion Detection in Wireless Sensor Networks”, Springer, Vol.295, 2014, pp.313-323. https://doi.org/10.1007/978-3-642-54174-2_28.

      [5] Francesco Buccafurri, Luigi Coppolino, Salvatore D’Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano, “Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks”, Springer, Vol.8666, 2014, pp.214-229. https://doi.org/10.1007/978-3-319-10506-2_15.

      [6] Wenchao Li, Ping Yi, Yue Wu, Li Pan, and Jianhua Li, “A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network”, Journal of Electrical and Computer Engineering, Hindawi Publication, 2014, pp.1-9.

      [7] K.Ankush, P.Ravindra and D.Krishna, “A Secure Intrusion-Detection System for Ad hoc mobile wireless networks”, International Journal of Embedded and Software Computing, Vol.5, 2014, pp.528-531.

      [8] Poongothai and K.Duraiswamy, “Cross Layer Intrusion Detection System of Mobile Ad Hoc Networks using Feature Selection Approach”, WSEAS Transactions on Communications, Vol.13, 2014, pp.71-79.

      [9] E.M.Shakshuki, Nan Kang, T.R.Sheltami, “EAACK – A Secure Intrusion Detection System for MANETs”, IEEE Transactions on Industrial Electronics, Vol.60, Issue 3, 2013, pp.1089-1098. https://doi.org/10.1109/TIE.2012.2196010.

      [10] Gerrigagoitia, K. Uribeetxeberria, R., Zurutuza, U. and Arenaza, I., “ Reputation based Intrusion Detection System for Wireless Sensor Networks”, IEEE Communications on Complexity in Engineering, 2012, pp.1-5

      [11] Peyman Kabiri and Mehran Aghaei, “Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks”, International Journal of Network Security, Vol.12, No.1, PP.42-49, Jan. 2011

      [12] Chong Eik Loo, Mun Yong Ng, Christopher Leckie and Marimuthu Palaniswami, “er 2006: pp. 1–27 Intrusion Detection for Routing Attacks in Sensor Networks”, International Journal of Distributed Sensor Networks, Vol.2, 2006, pp.313-332. https://doi.org/10.1080/15501320600692044.

      [13] John S. Baras, Svetlana Radosavac, George Theodorakopoulos, Dan Sterne, Peter Budulas and Richard Gopaul, “INTRUSION DETECTION SYSTEM RESILIENCY TO BYZANTINE ATTACKS: THE CASE STUDY OF WORMHOLES IN OLSR”, Research supported by the U.S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD19-01-2-0011.


 

View

Download

Article ID: 10169
 
DOI: 10.14419/ijet.v7i1.1.10169




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.