Skip to main content

A Cooperative Intrusion Detection System for Sleep Deprivation Attack Using Neuro-Fuzzy Classifier in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining - Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 32))

Abstract

This paper proposed a soft computing based solution for a very popular attack, i.e. sleep deprivation attack in mobile ad hoc networks (MANETs). As a soft computing solution, neuro-fuzzy classifier is used in binary form to detect the normal and abnormal activities in MANETs. The proposed detection scheme is based on distributed and cooperative architecture of intrusion detection system and simulations have been carried out through Qualnet simulator and MATLAB toolbox that shows the results of proposed solution in respect of performance metrics very effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chaudhary, A., Tiwari, V.N., Kumar, A.: Design an anomaly based fuzzy intrusion detection system for packet dropping attack in mobile ad hoc network. In: 2014 IEEE International Advance Computing Conference (IACC), pp. 256–261 Feb 2014

    Google Scholar 

  2. Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: 2014 International Conference on Optimization, Reliability, and Information Technology (ICROIT), pp. 178–181 (2014)

    Google Scholar 

  3. Chaudhary, A., Tiwari, V.N., Kumar, A.: Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks. In: Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), vol. 6, no. 1, pp. 690–696. ISSN 0973-5658 (2014)

    Google Scholar 

  4. Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90–100. IEEE (1999)

    Google Scholar 

  5. Sen, S., Clark, J.A., Tapiador, J.E.: Security Threats in Mobile Ad Hoc Networks. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, pp. 127–147. Auerbach Publications, Boca Raton (2010)

    Book  Google Scholar 

  6. Zadeh, L.A.: Roles of soft computing and fuzzy logic in the conception, design and deployment of information/intelligent systems. In: Computational Intelligence: Soft Computing and Fuzzy-Neuro Integration with Applications, pp. 1–9. Springer, Berlin (1998)

    Google Scholar 

  7. Şen, S., Clark, J.A.: A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 95–102. ACM (2009)

    Google Scholar 

  8. QualNet Network Simulator. Available http://www.Scalable-networks.com

  9. Jang, J.S.R., Sun, C.T., Mizutani, E.: Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence, 1st edn. Prentice Hall of India, New Delhi (1997)

    Google Scholar 

  10. Chiu, S.: Fuzzy model identification based on cluster estimation. J. Intell. Fuzzy Syst. 3, 267–278 (1994)

    Google Scholar 

  11. Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, vol. 6, no. 3, pp. 321–323. IEEE Computer Press, New York (2002)

    Google Scholar 

Download references

Acknowledgments

This work is partially supported by DST (Government of India) vide File No. DST/TSG/NTS/2012/106, we acknowledge A.N.TOOSI (Department of Computing and Information System), University of Melbourne for his useful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alka Chaudhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Chaudhary, A., Tiwari, V.N., Kumar, A. (2015). A Cooperative Intrusion Detection System for Sleep Deprivation Attack Using Neuro-Fuzzy Classifier in Mobile Ad Hoc Networks. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 2. Smart Innovation, Systems and Technologies, vol 32. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2208-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2208-8_32

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2207-1

  • Online ISBN: 978-81-322-2208-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics