Advertisement

Prevention of Replay Attack Using Intrusion Detection System Framework

  • Mamata RathEmail author
  • Binod Kumar Pattanayak
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)

Abstract

In current mobile technology, mobile ad hoc networks feature numerous challenges to sustain constant connectivity when there are adverse network situations such as link failure, routing attacks and security threats. In such cases, the network exhibits reactive approach using detection mechanism to prevent attacks. At the same time this network also demonstrates proactive approach by making attempts to avoid an attacker from doing attacking activity. It uses various cryptographic methodologies as the prevention mechanism for doing so. The proposed article presents an intrusion detection mechanism-based framework (IDMBF) for secured routing in a very specialized and challenging mobile ad hoc network. Simulation results show that the proposed system exhibited reduced packet loss rate and comparatively reduced end-to-end delay during data transmission when compared to other similar approaches.

Keywords

MANET IDS Mobile agent DoS attack Security protocol 

References

  1. 1.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282, First Quarter (2014)Google Scholar
  2. 2.
    Rath, M., Pattanayak, B.K., Pati, B.: Energy efficient MANET protocol using cross layer design for military applications. Def. Sci. J. 66(2) (2016)CrossRefGoogle Scholar
  3. 3.
    Rath, M., Pattanayak, B.K.: Energy competent routing protocol design in MANET with real time application provision. Int. J. Bus. Data Commun. Netw. 11(1), 50–60 (2015)CrossRefGoogle Scholar
  4. 4.
    Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045, Fourth Quarter (2013).  https://doi.org/10.1109/surv.2013.030713.00201CrossRefGoogle Scholar
  5. 5.
    Derr, K., Manic, M.: Adaptive control parameters for dispersal of multi-agent mobile ad hoc network (MANET) swarms. IEEE Trans. Industr. Inf. 9(4), 1900–1911 (2013)CrossRefGoogle Scholar
  6. 6.
    Chaki, R.: Intrusion detection: Ad-hoc networks to ambient intelligence framework. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), Krackow, pp. 7–12 (2010)Google Scholar
  7. 7.
    Guo, Y., Lee, I.: Forensic analysis of DoS attack traffic in MANET. In: 2010 Fourth International Conference on Network and System Security, Melbourne, VIC, pp. 293–298 (2010)Google Scholar
  8. 8.
    Shrestha, R., Sung, J.Y., Lee, S.D., Sik-Yun, P., Choi, D.Y., Han, S.J.: A secure intrusion detection system with authentication in mobile ad hoc network. In: 2009 Pacific-Asia Conference on Circuits, Communications and Systems, Chengdu, pp. 759–762 (2009)Google Scholar
  9. 9.
    Awatade, S., Joshi, S.: Improved EAACK: develop secure intrusion detection system for MANETs using hybrid cryptography. In: 2016 International Conference on Computing Communication Control and automation, Pune, pp. 1–4 (2016)Google Scholar
  10. 10.
    Nanaware, P.M., Babar, S.D.: Trust system based intrusion detection in mobile ad-hoc network (MANET). In: 2016 International Conference on Next Generation Intelligent Systems (ICNGIS), Kottayam, pp. 1–4 (2016)Google Scholar
  11. 11.
    Carvalho, J.M.A., Costa, P.C.G.: CMIDS: collaborative MANET intrusion detection system. In: 2016 International Conference on Cyber Conflict (CyCon U.S.), Washington, DC, pp. 1–5 (2016)Google Scholar
  12. 12.
    Patil, T., Joshi, B.: Improved acknowledgement intrusion detection system in MANETs using hybrid cryptographic technique. In: 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, pp. 636–641 (2015)Google Scholar
  13. 13.
    Indira, N.: Establishing a secure routing in MANET using a hybrid intrusion detection system. In: 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, pp. 260–263 (2014)Google Scholar
  14. 14.
    Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Industr. Electron. 60(3), 1089–1098 (2013)CrossRefGoogle Scholar
  15. 15.
    Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRefGoogle Scholar
  16. 16.
    Rath, M., Pattanayak, B.K.: MAQ: a mobile agent based quality of service platform for MANETs. Int. J. Bus. Data Commun. Netw. 13(1) (2017)CrossRefGoogle Scholar
  17. 17.
    Pattanayak, B., Rath, M.: A Mobile agent based intrusion detection system architecture for mobile ad hoc networks. J. Comput. Sci. 10, 970–975 (2014)CrossRefGoogle Scholar
  18. 18.
    Rath, M., Pattanayak, B.K., Pati, B.: Energetic routing protocol design for real-time transmission in mobile ad hoc network. In: Computing and Network Sustainability, Lecture Notes in Networks and Systems, vol 12. Springer, Singapore (2017)Google Scholar
  19. 19.
    Shrestha, R., Han, K.H., Choi, D.Y., Han, S.J.: A novel cross layer intrusion detection system in MANET. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, WA, pp. 647–654 (2010)Google Scholar
  20. 20.
    Carvalho, J.M.A., Costa, P.C.G.: Collaborative approach for a MANET intrusion detection system using multilateration. In: 2016 11th International Conference on Computer Engineering & Systems (ICCES), Cairo, pp. 59–65 (2016)Google Scholar
  21. 21.
    Sangeetha, V., Kumar, S.S.: ZIDS: zonal-based intrusion detection system for studying the malicious node behaviour in MANET. In: 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, pp. 276–281 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.C. V. Raman College of EngineeringBhubaneswarIndia
  2. 2.Department of Computer Science and EngineeringSOA UniversityBhubaneswarIndia

Personalised recommendations