Advertisement

Identifying Camouflaging Adversary in MANET Using Cognitive Agents

Article
  • 25 Downloads

Abstract

Mobile ad hoc networks (MANETs) are often prone to variety of attacks like denial of service, impersonation, eavesdropping, camouflaging adversary, blackhole, wormhole, replay, jamming, man in the middle, etc. Among all these attacks camouflaging adversary attack is the attack, launched by an insider and has a devastating effect on network performance. In this paper, we present a cognitive agents (CAs) based security scheme for identifying camouflaging adversaries in MANETs. The proposed scheme uses CAs with observations-belief model to effectively identify camouflaging adversary nodes and the identified nodes will be isolated from the network. The isolation of the camouflaged adversaries enhances the network performance with respect to various performance metrics like bandwidth, throughput, packet drop ratio, reliability, etc.

Keywords

MANETs Camouflaging adversaries Cognitive agents Observations-belief model Dynamic Performance Cluster 

References

  1. 1.
    Bakshi, A., Sharma, A. K., & Mishra, A. (2013). Significance of mobile AD-HOC networks (MANETS). International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2, 1–5.Google Scholar
  2. 2.
    Yadav, S., Jain, R., & Faisal, M. (2012). Attacks in MANET. International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(3), 123–126.Google Scholar
  3. 3.
    Ramachandran, S., & Shanmugan, V. (2011). Impact of sybil and worm-hole attacks in location based geographic multicast routing protocol for wireless sensor networks. International Journal of Computer Science, 7, 973.CrossRefGoogle Scholar
  4. 4.
    Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11, 38–47.CrossRefGoogle Scholar
  5. 5.
    Rai, A. K., Tewari, R. R., & Upadhyay, S. K. (2009). Different types of attacks on integrated MANET-internet communication. International Journal of Computer Science and Security (IJCSS), 4, 265–274.Google Scholar
  6. 6.
    Ramachandran, S., & Shanmugam, V. (2012). Performance comparison of routing attacks in MANET and WSN. International Journal of Ad hoc, Sensor Ubiquitous Computing (IJASUC), 3, 41.CrossRefGoogle Scholar
  7. 7.
    Vanamala, C. K., Singhania, P., & Kumar, M. S. (2014). A survey of different lethal attacks ON MANETs. International Journal of Advancements in Research Technology, 3(3).Google Scholar
  8. 8.
    Shrivastava, S., & Jain, S. (2013). A brief introduction of different type of security attacks found in mobile ad-hoc network. International Journal of Computer Science Engineering Technology (IJCSET), 4(3).Google Scholar
  9. 9.
    Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering. 1(2), 98–104.Google Scholar
  10. 10.
    Swapna, G., & Srivatsav, R. P. (2012). Securing web applications by analyzing the logs of the database server or web server. International Journal of Engineering Research and Applications (IJERA), 2(6), 432–435.Google Scholar
  11. 11.
    Gaines, B. L., & Ramkumar, M. (2008). A framework for dual-agent MANET routing protocols. In IEEE global telecommunications conference-IEEE GLOBECOM.Google Scholar
  12. 12.
    Mandal, J. K., & Hassan, K. L. (2013). A novel technique to detect intrusion in MANET. International Journal of Network Security its Applications (IJNSA), 5, 179.CrossRefGoogle Scholar
  13. 13.
    Pongaliur, K., Xiao, L., & Liu, A. X. (2009). CENDA: Camouflage event based malicious node detection architecture. In IEEE 6th international conference on mobile ad hoc and sensor systems.Google Scholar
  14. 14.
    Goyal, P., Parmar, V., & Rishi, R. (2011). MANET: Vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering Management, 11, 32–37.Google Scholar
  15. 15.
    Nadher M. A, Hassan, S., & Kadhum, M. M. (2011). Mobile ad hoc networks under wormhole attack: A simulation study. In Proceedings of the 3rd international conference on computing and informatics.Google Scholar
  16. 16.
    Roy, D. B., & Chaki, R. (2011). MADSN: Mobile agent based detection of selfish node in MANET. International Journal of Wireless Mobile Networks (IJWMN), 3, 225–235.Google Scholar
  17. 17.
    Jain, Y. K., & Ahirwar, R. K. (2012). Secure mobile agent based IDS for MANET. International Journal of Computer Science and Information Technologies, 3, 4798–4805.Google Scholar
  18. 18.
    Kumar, R., & Lokesh, S. (2015). Fast and secure transmission of information among groups using a key management scheme. International Journal of Computer Science and Mobile Computing, 4(11), 40–47.Google Scholar
  19. 19.
    Meyer, R. & Cid, C. (2008). Detecting attacks on web applications from log files. SANS Institute InfoSec Reading Room.Google Scholar
  20. 20.
    Ramesh, K., & Somasundaram, K. (2011). A comparative study of cluster-head selection algorithms in wireless sensor networks. International Journal of Computer Science Engineering Survey (IJCSES), 2(4).  https://doi.org/10.5121/ijcses.2011.2411.153.
  21. 21.
    Kumar, P. M., & Gandhi, U. D. (2017). A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Computers & Electrical Engineering, 65, 222–235.  https://doi.org/10.1016/j.compeleceng.2017.09.001.CrossRefGoogle Scholar
  22. 22.
    Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications.  https://doi.org/10.1007/s11042-017-5318-1.Google Scholar
  23. 23.
    Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems, 80(5), 1–10.  https://doi.org/10.1016/j.future.2017.10.045.Google Scholar
  24. 24.
    Kumar, P. M., Gandhi, U., Varatharajan, R., Manogaran, G., Jidhesh, R., & Vadivel, T. (2017). Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Cluster Computing.  https://doi.org/10.1007/s10586-017-1323-4.Google Scholar
  25. 25.
    Kumar, P. M., & Gandhi, U. D. (2017). Enhanced DTLS with CoAP-based authentication scheme for the Internet of Things in healthcare application. The Journal of Supercomputing.  https://doi.org/10.1007/s11227-017-2169-5.Google Scholar
  26. 26.
    Manogaran, G., Varatharajan, R., & Priyan, M. K. (2017). Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Applications.  https://doi.org/10.1007/s11042-017-5515-y.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information TechnologySri Ramakrishna Institute of TechnologyCoimbatoreIndia
  2. 2.Department of Computer Science and EngineeringHindusthan Institute of TechnologyCoimbatoreIndia
  3. 3.Department of Computer Science and EngineeringHindusthan College of Engineering and TechnologyCoimbatoreIndia

Personalised recommendations