Skip to main content

A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET

  • Conference paper
  • First Online:
Cybernetics and Algorithms in Intelligent Systems (CSOC2018 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 765))

Included in the following conference series:

  • 723 Accesses

Abstract

Over the past decade, mobile ad-hoc networks (MANET) gained the attention of researchers and became a key technology in many aspects owing to its potential applicability and increased usage in providing efficient wireless networking. The ability of enabling an instant temporary wireless networking scenario in situations like flooding and defense made MANET a prominent domain of research. Although, it has been extensively studied with respect to different means of issues including network security, power consumption issues etc. but the core findings in the area of security were found mostly limited to theoretical contributions. Moreover, An intrusion detection systems (IDS) enable different procedures involved into monitoring the activities being exercised in a MANET whether; it poses any suspicious or malicious events that could be harmful for the entire system. The conventional IDS models are more likely to consume higher level of energy which minimizes the network lifetime owing to rapid depletion of node’s battery power. The study thereby primarily addressed this issue and come up with an efficient scheme which targets to optimize the time period in which IDS remain busy in a large-scale MANET. It also incorporated a technique which relates probabilistic theory of optimization to bring an effective cooperation among IDSs and neighbor nodes which leads to reduce their individual busy time. The proposed approach aims to reduce busy time of individual IDS while maintaining their effectiveness towards achieving defined tasks. To support the performance efficiency the proposed study developed an algorithm and simulated it over a numerical computing tool in terms of different performance parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217–241 (2012)

    Article  Google Scholar 

  2. Bhoi, S.K., Khilar, P.M.: Vehicular communication: a survey. IET Netw. 3(3), 204–217 (2014)

    Article  Google Scholar 

  3. Marti, S., Giuli, T.J., La, K., Baker, M.: Mitigating routing misbehavior in a mobile ad-hoc environment. In: Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265, August 2000

    Google Scholar 

  4. Bernsen, J., Manivannan, D.: Unicast routing protocols for vehicular ad hoc networks: a critical comparison and classification. Pervasive Mob. Comput. 5(1), 1–18 (2009)

    Article  Google Scholar 

  5. Kumar, R., Dave, M.: A comparative study of various routing protocols in VANET, CoRR, vol. abs/1108.2094 (2011)

    Google Scholar 

  6. Zhang, M., Wolff, R.S.: A border node based routing protocol for partially connected vehicular ad hoc networks. J. Commun. 5(2), 130–143 (2010)

    Article  Google Scholar 

  7. Hoang Hai, T., Huh, E.-N.: Optimal selection and activation of intrusion detection agents for wireless sensor networks. In: Proceedings of the Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 350–355, 6–8 December 2007

    Google Scholar 

  8. Fitaci, S.M., Jaffres-Runser, K., Comaniciu, C.: On modeling energy-security trade-offs for distributed monitoring in wireless ad hoc networks. In: Proceedings of the Military Communications Conference, MILCOM 2008, pp. 1–7. IEEE, 16–19 November 2008

    Google Scholar 

  9. Clegg, R.G., Clayman, S., Pavlou, G., Mamatas, L., Galis, A.: On the selection of management/monitoring nodes in highly dynamic networks. IEEE Trans. Comput. 62(6), 1207–1220 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  10. Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514–527 (2011)

    Article  Google Scholar 

  11. Khalil, I., Bagchi, S., Shroff, N.B.: SLAM: sleep-wake aware local monitoring in sensor networks. In: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 565–574 (2007)

    Google Scholar 

  12. Zheng, R., Le, T., Han, Z.: Approximate online learning algorithms for optimal monitoring in multi-channel wireless networks. IEEE Trans. Wirel. Commun. 13(2), 1023–1033 (2014)

    Article  Google Scholar 

  13. Tsikoudis, N., Papadogiannakis, A., Markatos, E.P.: LEoNIDS: a low-latency and energy-efficient network-level intrusion detection system. IEEE Trans. Emerg. Top. Comput. PP(99) (2014)

    Google Scholar 

  14. Muradore, R., Quaglia, D.: Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans. Ind. Inform. 11(3), 830–840 (2015)

    Article  Google Scholar 

  15. Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: Proceedings of the 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 4510–4513, 8–10 August 2011

    Google Scholar 

  16. Afgah, A., Das, S.K., Basu, K.: A non-cooperative game approach for intrusion detection in sensor networks. In: Proceedings of the VTC 2004, Fall 2004

    Google Scholar 

  17. Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004

    Google Scholar 

  18. Liu, Y., Man, H., Comaniciu, C.: A game theoretic approach to efficient mixed strategies for intrusion detection. In: Proceedings of the IEEE International Conference on Communications (ICC 2006) (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Najiya Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sultana, N. (2019). A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET. In: Silhavy, R. (eds) Cybernetics and Algorithms in Intelligent Systems . CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 765. Springer, Cham. https://doi.org/10.1007/978-3-319-91192-2_38

Download citation

Publish with us

Policies and ethics