Skip to main content

A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-Hoc Networks from a Security Viewpoint

  • Conference paper
  • First Online:
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 986))

Included in the following conference series:

Abstract

A Mobile Adhoc Network (MANET) comprises of wide range of applications, since past one decade it has offered a tremendous breakthrough in the field of wireless communication. Therefore, its potential cost-effective routing and resource scheduling operations have not only enhanced the communicational benefits but also made it a hot topic of interest among different scientific and research communities. However, despite having so many diverse potential aspects, it lacks efficiency in terms security owing to the dynamic and non-centralized way of topology formation while performing communication. It also often found undergoing through an increasingly diverse application requirement which made it resource constrained. Thereby, in this type of network formation, the probability of threat occurrence for the purpose of disrupting communication process is more which also affects the data reliability to a huge extent. This study inclines towards addressing the security issue which is still an open research problem in the domain of MANET and further introduces a cost-effective computational intelligence driven mechanism which can enhance the resistivity of network model by discretizing all form of intrusions. Identifying network intrusion within a specified time increases the network reliability factor which is quite essential in MANET data computation and analysis. The proposed formulated analytical design is a computational process and experimented in a numerical computing platform to validate the performance in terms of throughput and packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jamalipour, A., Ma, Y.: Intermittently Connected Mobile Ad Hoc Networks: From Routing to Content Distribution. Springer, New York (2011)

    Book  Google Scholar 

  2. Hinze, A.M.: Principles and Applications of Distributed Event-Based Systems. IGI Global, Hershey (2010)

    Book  Google Scholar 

  3. Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends: Research Trends. IGI Global, Hershey (2012)

    Book  Google Scholar 

  4. Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)

    Google Scholar 

  5. Jambulingam, V.: Secure and Anonymous Routing for Mobile Adhoc Networks: Secure and Anonymous On-Demand Routing for Mobile Adhoc Networks. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2014)

    Google Scholar 

  6. Javaid, A.: Securing Mobile Ad Hoc Networks: Resource-Aware Self-Adaptive Security. Syngress, Rockland (2014)

    Google Scholar 

  7. Dinesh, Kumar, A., Singh, J.: A literature survey of secure routing protocols for MANET. Int. J. Appl. Sci. Eng. Res. 3(6) (2014)

    Google Scholar 

  8. Ranaut, D., Lal, M.: A review on security issues and encryption algorithms in mobile ad-hoc network. Int. J. Sci. Res. 3(6), 146–148 (2014). ISSN 2319-7064

    Google Scholar 

  9. Kukreja, D., Singh, U., Reddy, B.V.R.: A survey of trust based routing protocols in MANETs. J. Adv. Comput. Netw. 1(4), 280–285 (2013)

    Google Scholar 

  10. Meganathan, N.T., Palanichamy, Y.: Privacy preserved and secured reliable routing protocol for wireless mesh networks (2015). Hindawi Publishing Corporation, Article ID 636590

    Google Scholar 

  11. Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks (2015). Hindawi Publishing Corporation, Article ID 801632

    Google Scholar 

  12. Alwan, H., Agarwal, A.: A multipath routing approach for secure and reliable data delivery in wireless sensor networks (2013). Hindawi Publishing Corporation, Article ID 232798

    Google Scholar 

  13. Guo, Y., Ma, J., Wang, C., Yang, K.: Incentive-based optimal nodes selection mechanism for threshold key management in MANETs with selfish nodes. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation, Article ID 416983

    Google Scholar 

  14. Kim, D.-U., Kim, H.-W., Kim, G., Kim, S.: A counterattack-detection scheme in transmission time-based wormhole detection methods. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation, Article ID 184931

    Google Scholar 

  15. Askoxylakis, I.G., Tryfonas, T., May, J., Siris, V., Traganitis, A.: A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking. EURASIP J. Wirel. Commun. Netw. (2011). Hindawi Publishing Corporation, Article ID 807684

    Google Scholar 

  16. Caballero-Gil, P., Hernández-Goya, C.: Efficient public key certificate management for mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. (2011). Hindawi Publishing Corporation, Article ID 935457

    Google Scholar 

  17. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: secure, efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw. 1, 175–192 (2003)

    Article  Google Scholar 

  18. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Pradeep Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pradeep Kumar, K., Prasad Babu, B.R. (2019). A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-Hoc Networks from a Security Viewpoint. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_9

Download citation

Publish with us

Policies and ethics