Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs
-
2018-04-18 https://doi.org/10.14419/ijet.v7i2.20.11736 -
Mobile Ad hoc network, agent, intrusion detection system, malicious node -
Abstract
Intrusion detection is one of challenging issues in wireless networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based Mobile ad hoc network environment. The model comprises of mobile agents, which are used to detect intrusions, respond to intrusions, mainly preventing the routing attacks while securing them and distributing selected and aggregated intrusion information to all other nodes in the network in an intelligent manner to compensate the attack. The model is simulated to test its operation effectiveness by considering various performance parameters such as, packet delivery ratio, communication overhead, throughput. It implements a secure detection and prevention technique that contains the Blowfish algorithm which is a symmetric encryption and decryption algorithm having a secure standard till date against attacks to make the network transmission secure while monitoring malicious nodes and preventing them from compromising the integrity of the network. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, and flexibility.
Â
-
References
[1] Zhang Z, Zhu H, Luo S, Xin Y & Liu X, “Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networksâ€, IEEE Access, Vol.5, (2017), pp.12088-12102.
[2] Reshmi BM & Manvi SS, “An agent based Intrusion Detection model for mobile ad hoc networksâ€, Mobile Information Systems, Vol.2, (2006), pp.169–191.
[3] Panos C, Ntantogian C, Malliaros S & Xenakis C, “Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networksâ€, Computer Networks, Vol.113, (2017), pp.94-110.
[4] Tyagi P & Dembla D, “Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)â€, Egyptian Informatics Journal, Vol.18, No.2,(2017), pp.133-139.
[5] Chowdhury C & Neogy S, “Securing Mobile Agents in MANET against attacks using Trustâ€, International Journal of Network Security & Its Applications, Vol.3, No.6,(2011).
[6] Dasgupta D, Gonzalez F, Yallapu K, Gomez J & Yarramseti R, “CIDS: An agent-based intrusion detection systemâ€, Computers & Security, Vol.24, (2005), pp.387-398.
[7] Shakshuki EM, Kang N & Sheltami TR, “EAACK-A Secure Intrusion Detection System for MANETsâ€, IEEE transactions on industrial electronics, Vol.60, No3, (2013).
[8] Panaousis EA, Ramrekha TA, Millar GP & Politis C, “Adaptive and secure routing protocol for emergency mobile ad hoc networksâ€, International Journal of wireless and mobile networks (IJWMN), Vol.2, No.2, (2010).
[9] Liu K, Deng J, Varshney PK & Balakrishnan K, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETsâ€, IEEE Trans. Mobile Computing, Vol.6, No.5, (2007), pp.536–550.
[10] Chandel GS & Chowksi R, “Study of Rushing attack in MANETâ€, International Journal of Computer Applications, Vol.79, No.10,(2013).
-
Downloads
-
How to Cite
Aranganathan, A., & D. Suriyakala, C. (2018). Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs. International Journal of Engineering & Technology, 7(2.20), 22-25. https://doi.org/10.14419/ijet.v7i2.20.11736Received date: 2018-04-19
Accepted date: 2018-04-19
Published date: 2018-04-18