India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach
- 380 Downloads
Due to lack of a central bureaucrat in mobile ad hoc networks, the security of the network becomes serious issue. During malicious attacks, according to the motivation of intruder the severity of the threat varies. It may lead to loss of data, energy or throughput. This paper proposes a lightweight Intruder Node Detection and Isolation Action mechanism (INDIA) using feature extraction, feature optimization and classification techniques. The indirect and direct trust features are extracted from each node and the total trust feature is computed by combining them. The trust features are extracted from each node of MANET and these features are optimized using Particle Swarm Optimization (PSO) algorithm as feature optimization technique. These optimized feature sets are then classified using Neural Networks (NN) classifier which identifies the intruder node. The performance of the proposed methodology is studied in terms of various parameters such as success rate in packet delivery, delay in communication and the amount of energy consumption for identifying and isolating the intruder.
KeywordsMANET Intrusion detection system Malicious node detection Feature extraction Feature optimization Classification
Compliance with ethical standards
Conflict of Interest
This paper has not communicated anywhere till now and it is not under processing anywhere. This article is communicated to your esteemed journal for the publication with the knowledge consent of all co-authors.
- 1.Moudni, H., Er-Rouidi, M., Mouncif, H., and El Hadadi, B., Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. Proceedings of 2016 International Conference on Electrical and Information Technologies, 2016.Google Scholar
- 8.Patel, K. S., and Shah, J. S., Detection and avoidance of malicious node in MANET. International Conference on Computer, Communication and Control (IC4), Indore, India, 2015.Google Scholar
- 9.Singh, Y., and Jena, S. K., Intrusion detection system for detecting malicious nodes in mobile ad hoc networks. Advances in parallel distributed computing. Communications in Computer and Information Science, 203: 410–419, 2011.Google Scholar
- 10.Chang, J.-M., Tsou, P.-C., Chao, H.-C., and Chen, J.-L., CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture. Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011, Chennai, India, 1–5, 2011Google Scholar
- 11.Vishnu, K., and Paul, A. J., Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks. Int. J. Comput. Appl. 1(22):38–42, 2010.Google Scholar
- 12.Baadache, A., and Belmehdi, A., Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks. International Journal of Computer Science and Information Security. 7(l):10–16, 2010.Google Scholar
- 13.Lu, S., Li, L., Lam, K.-Y., and Jia, L., SAODV: A MANET routing protocol that can with stand blackhole attack. International conference on computational intelligence and security (CIS). 421–425, 2009.Google Scholar
- 14.Petersen, E., To, M. A., and Maag, S., A novel online CEP learning engine for MANET IDS. IEEE 9th Latin-American Conference on Communications (LATINCOM), Guatemala City, Guatemala, 2017.Google Scholar
- 16.Kavitha, T., and Muthaiah, R., Position aided cluster based routing for extending MANET lifetime. Res. J. Pharm. Biol. Chem. Sci. 8(1):1436–1449, 2017.Google Scholar