Skip to main content

Agent Based IDS Using RMBOPB Technique in MANET

  • Conference paper
  • First Online:
Computational Intelligence, Communications, and Business Analytics (CICBA 2017)

Abstract

In this paper a new intrusion detection technique in MANET has been proposed, where a monitoring node fired agents that traverse each node sequentially and also detects the malicious node. The agent is based on the Recursively Modulo two and Bitwise Operations of Paired Bits (RMBOPB). Ad-Hoc On-demand Distance Vector (AODV) is taken as routing protocol in MANET. NS2 (2.34) is taken as simulator where it is considered two types variable of parameters like node density and percentage of malicious nodes. Variable node density are considered from twenty nodes up to one hundred nodes with a uniform variation of twenty. Percentage of malicious nodes are also varied from zero to twenty percent with a variation of five. Generated packet; drop packet; average delay and throughput are taken as parameters for analysis purpose. Performances are studied for the proposed model to validate the results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks Architecture and Protocols. Pearson Education, India (2005)

    Google Scholar 

  2. Mohapatra, P., Krishnamurthy, S.: Ad Hoc Networks: Technologies and Protocols. Springer, New York (2005)

    Book  Google Scholar 

  3. Toh, C.-K.: Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, Englewood Cliffs (2002)

    Google Scholar 

  4. Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Network. Cambridge University Press, New York (2008)

    Book  Google Scholar 

  5. Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. Auerbach Publications, Boca Raton (2008)

    Google Scholar 

  6. Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, Boston (2009)

    Book  Google Scholar 

  7. Marc Greis’ Tutorial. http://www.isi.edu/nsnam/ns/tutorial/. Last accessed 8 Jun 2015

  8. Rehmani, M.H., Doria, S., Senouci, M.R.: A Tutorial on the Implementation of Ad-Hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2). www.arxiv.org/pdf/1007.4065. Last accessed 8 Jun 2015

  9. Mandal, J.K., Hassan, K.L.: A novel technique to detect intrusion in MANET. Int. J. Netw. Secur. Appl. (IJNSA), 5(5) (2013). Online ISSN 0974-9330, Print ISSN 0975-2307

    Google Scholar 

  10. Mandal, J.K., Hassan, K.L.: Secure agent base data transmission in MANET. Int. J. Adv. Res. Comput. Sci. (IJARCS), 4(8) (2013). ISSN 0976-5697

    Google Scholar 

  11. Mandal, J.K., Hassan, K.L.: Agent based Intrusion Detection System in MANET. In: Proceedings of Third International Conference on Computer Science & Information Technology (CCSIT 2013). LNICST, Bangalore, India, 18–20 February 2013, p. 76. Springer (2013). ISSN 1867-8211

    Google Scholar 

  12. Dokurer, S., Ert, Y.M., Acar, C.E.: Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings, pp. 148–153. IEEE (2007)

    Google Scholar 

  13. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. www.cs.ucsb.edu/~ebelding/txt/wmcsa99.pdf. Accessed 8 June 2015

  14. Deng, H., Li, W., Agrawal, D.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)

    Article  Google Scholar 

  15. Al-Shurman, M., Yoo, S., Park, S.: Black hole attack in mobile ad hoc networks. In: ACM Southeast Regional Conference, pp. 96–97 (2004)

    Google Scholar 

  16. Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad-hoc networks. IEEE Wirel. Commun. 11, 48–60 (2004)

    Article  Google Scholar 

  17. Usha, B.: Understanding black hole attack in MANET. Eur. J. Sci. Res. 83(3), 383–396 (2012). ISSN 1450-216X

    MathSciNet  Google Scholar 

  18. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM (2000)

    Google Scholar 

  19. Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9, 545–556 (2003). Kluwer Academic Publishers

    Article  Google Scholar 

  20. Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN 2003 Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp 135–147 (2003)

    Google Scholar 

  21. Nadeem, A., Howarth, M.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)

    Article  Google Scholar 

  22. Korba, A.A., Nafaa, M., Ghamri-Doudane, Y.: Anomaly-based intrusion detection system for ad hoc networks. In: 2016 7th International Conference on Network of the Future (NOF), Rio de Janeiro, Brazil, 16–18 November 2016. IEEE (2016). Electronic ISBN 978-1-5090-4671-3

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khondekar Lutful Hassan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Hassan, K.L., Bera, S., Bag, P. (2017). Agent Based IDS Using RMBOPB Technique in MANET. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6427-2_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6426-5

  • Online ISBN: 978-981-10-6427-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics