Abstract
A Mobile Adhoc Network (MANET) comprises of wide range of applications, since past one decade it has offered a tremendous breakthrough in the field of wireless communication. Therefore, its potential cost-effective routing and resource scheduling operations have not only enhanced the communicational benefits but also made it a hot topic of interest among different scientific and research communities. However, despite having so many diverse potential aspects, it lacks efficiency in terms security owing to the dynamic and non-centralized way of topology formation while performing communication. It also often found undergoing through an increasingly diverse application requirement which made it resource constrained. Thereby, in this type of network formation, the probability of threat occurrence for the purpose of disrupting communication process is more which also affects the data reliability to a huge extent. This study inclines towards addressing the security issue which is still an open research problem in the domain of MANET and further introduces a cost-effective computational intelligence driven mechanism which can enhance the resistivity of network model by discretizing all form of intrusions. Identifying network intrusion within a specified time increases the network reliability factor which is quite essential in MANET data computation and analysis. The proposed formulated analytical design is a computational process and experimented in a numerical computing platform to validate the performance in terms of throughput and packet delivery ratio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jamalipour, A., Ma, Y.: Intermittently Connected Mobile Ad Hoc Networks: From Routing to Content Distribution. Springer, New York (2011)
Hinze, A.M.: Principles and Applications of Distributed Event-Based Systems. IGI Global, Hershey (2010)
Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends: Research Trends. IGI Global, Hershey (2012)
Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)
Jambulingam, V.: Secure and Anonymous Routing for Mobile Adhoc Networks: Secure and Anonymous On-Demand Routing for Mobile Adhoc Networks. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2014)
Javaid, A.: Securing Mobile Ad Hoc Networks: Resource-Aware Self-Adaptive Security. Syngress, Rockland (2014)
Dinesh, Kumar, A., Singh, J.: A literature survey of secure routing protocols for MANET. Int. J. Appl. Sci. Eng. Res. 3(6) (2014)
Ranaut, D., Lal, M.: A review on security issues and encryption algorithms in mobile ad-hoc network. Int. J. Sci. Res. 3(6), 146–148 (2014). ISSN 2319-7064
Kukreja, D., Singh, U., Reddy, B.V.R.: A survey of trust based routing protocols in MANETs. J. Adv. Comput. Netw. 1(4), 280–285 (2013)
Meganathan, N.T., Palanichamy, Y.: Privacy preserved and secured reliable routing protocol for wireless mesh networks (2015). Hindawi Publishing Corporation, Article ID 636590
Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks (2015). Hindawi Publishing Corporation, Article ID 801632
Alwan, H., Agarwal, A.: A multipath routing approach for secure and reliable data delivery in wireless sensor networks (2013). Hindawi Publishing Corporation, Article ID 232798
Guo, Y., Ma, J., Wang, C., Yang, K.: Incentive-based optimal nodes selection mechanism for threshold key management in MANETs with selfish nodes. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation, Article ID 416983
Kim, D.-U., Kim, H.-W., Kim, G., Kim, S.: A counterattack-detection scheme in transmission time-based wormhole detection methods. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation, Article ID 184931
Askoxylakis, I.G., Tryfonas, T., May, J., Siris, V., Traganitis, A.: A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking. EURASIP J. Wirel. Commun. Netw. (2011). Hindawi Publishing Corporation, Article ID 807684
Caballero-Gil, P., Hernández-Goya, C.: Efficient public key certificate management for mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. (2011). Hindawi Publishing Corporation, Article ID 935457
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: secure, efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw. 1, 175–192 (2003)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pradeep Kumar, K., Prasad Babu, B.R. (2019). A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-Hoc Networks from a Security Viewpoint. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-19813-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19812-1
Online ISBN: 978-3-030-19813-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)