India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach

  • T. KavithaEmail author
  • K. Geetha
  • R. Muthaiah
Transactional Processing Systems
Part of the following topical collections:
  1. Wearable Computing Techniques for Smart Health


Due to lack of a central bureaucrat in mobile ad hoc networks, the security of the network becomes serious issue. During malicious attacks, according to the motivation of intruder the severity of the threat varies. It may lead to loss of data, energy or throughput. This paper proposes a lightweight Intruder Node Detection and Isolation Action mechanism (INDIA) using feature extraction, feature optimization and classification techniques. The indirect and direct trust features are extracted from each node and the total trust feature is computed by combining them. The trust features are extracted from each node of MANET and these features are optimized using Particle Swarm Optimization (PSO) algorithm as feature optimization technique. These optimized feature sets are then classified using Neural Networks (NN) classifier which identifies the intruder node. The performance of the proposed methodology is studied in terms of various parameters such as success rate in packet delivery, delay in communication and the amount of energy consumption for identifying and isolating the intruder.


MANET Intrusion detection system Malicious node detection Feature extraction Feature optimization Classification 


Compliance with ethical standards

Conflict of Interest

This paper has not communicated anywhere till now and it is not under processing anywhere. This article is communicated to your esteemed journal for the publication with the knowledge consent of all co-authors.


  1. 1.
    Moudni, H., Er-Rouidi, M., Mouncif, H., and El Hadadi, B., Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. Proceedings of 2016 International Conference on Electrical and Information Technologies, 2016.Google Scholar
  2. 2.
    Deng, H., Li, W., and Agrawal, D. P., Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40(10):70–75, 2002.CrossRefGoogle Scholar
  3. 3.
    Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J.-P., and Le Boudec, J.-Y., Self-organization in mobile ad-hoc networks: The approach of terminodes. IEEE Commun. Mag. 39(6):166–174, 2001.CrossRefGoogle Scholar
  4. 4.
    Liu, K., Deng, J., Varshney, P. K., and Balakrishnan, K., An acknowledgement based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5):536–550, 2007.CrossRefGoogle Scholar
  5. 5.
    Gopalakrishnan, S., and Kumar, P., Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems. 7:748–758, 2016.CrossRefGoogle Scholar
  6. 6.
    Lal, N., Kumar, S., Saxena, A., and Chaurasiya, V. K., Detection of malicious node behaviour via I-watchdog protocol in mobile ad hoc network with DSDV routing scheme. Procedia Computer Science. 49:264–273, 2015.CrossRefGoogle Scholar
  7. 7.
    Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., and Lai, C.-F., Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J. 9(1):65–75, 2015.CrossRefGoogle Scholar
  8. 8.
    Patel, K. S., and Shah, J. S., Detection and avoidance of malicious node in MANET. International Conference on Computer, Communication and Control (IC4), Indore, India, 2015.Google Scholar
  9. 9.
    Singh, Y., and Jena, S. K., Intrusion detection system for detecting malicious nodes in mobile ad hoc networks. Advances in parallel distributed computing. Communications in Computer and Information Science, 203: 410–419, 2011.Google Scholar
  10. 10.
    Chang, J.-M., Tsou, P.-C., Chao, H.-C., and Chen, J.-L., CBDS: A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture. Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011, Chennai, India, 1–5, 2011Google Scholar
  11. 11.
    Vishnu, K., and Paul, A. J., Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks. Int. J. Comput. Appl. 1(22):38–42, 2010.Google Scholar
  12. 12.
    Baadache, A., and Belmehdi, A., Avoiding blackhole and cooperative blackhole attacks in wireless ad hoc networks. International Journal of Computer Science and Information Security. 7(l):10–16, 2010.Google Scholar
  13. 13.
    Lu, S., Li, L., Lam, K.-Y., and Jia, L., SAODV: A MANET routing protocol that can with stand blackhole attack. International conference on computational intelligence and security (CIS). 421–425, 2009.Google Scholar
  14. 14.
    Petersen, E., To, M. A., and Maag, S., A novel online CEP learning engine for MANET IDS. IEEE 9th Latin-American Conference on Communications (LATINCOM), Guatemala City, Guatemala, 2017.Google Scholar
  15. 15.
    Vishnu Balan, E., Priyan, M. K., Gokulnath, C., and Usha Devi, G., Fuzzy based intrusion detection systems in MANET. Procedia Computer Science 50:109–114, 2015.CrossRefGoogle Scholar
  16. 16.
    Kavitha, T., and Muthaiah, R., Position aided cluster based routing for extending MANET lifetime. Res. J. Pharm. Biol. Chem. Sci. 8(1):1436–1449, 2017.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019
corrected publication May/2019

Authors and Affiliations

  1. 1.School of ComputingSASTRA Deemed to be UniversityThanjavurIndia

Personalised recommendations