Abstract
In this paper a new intrusion detection technique in MANET has been proposed, where a monitoring node fired agents that traverse each node sequentially and also detects the malicious node. The agent is based on the Recursively Modulo two and Bitwise Operations of Paired Bits (RMBOPB). Ad-Hoc On-demand Distance Vector (AODV) is taken as routing protocol in MANET. NS2 (2.34) is taken as simulator where it is considered two types variable of parameters like node density and percentage of malicious nodes. Variable node density are considered from twenty nodes up to one hundred nodes with a uniform variation of twenty. Percentage of malicious nodes are also varied from zero to twenty percent with a variation of five. Generated packet; drop packet; average delay and throughput are taken as parameters for analysis purpose. Performances are studied for the proposed model to validate the results.
References
Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Networks Architecture and Protocols. Pearson Education, India (2005)
Mohapatra, P., Krishnamurthy, S.: Ad Hoc Networks: Technologies and Protocols. Springer, New York (2005)
Toh, C.-K.: Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, Englewood Cliffs (2002)
Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Network. Cambridge University Press, New York (2008)
Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. Auerbach Publications, Boca Raton (2008)
Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, Boston (2009)
Marc Greis’ Tutorial. http://www.isi.edu/nsnam/ns/tutorial/. Last accessed 8 Jun 2015
Rehmani, M.H., Doria, S., Senouci, M.R.: A Tutorial on the Implementation of Ad-Hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2). www.arxiv.org/pdf/1007.4065. Last accessed 8 Jun 2015
Mandal, J.K., Hassan, K.L.: A novel technique to detect intrusion in MANET. Int. J. Netw. Secur. Appl. (IJNSA), 5(5) (2013). Online ISSN 0974-9330, Print ISSN 0975-2307
Mandal, J.K., Hassan, K.L.: Secure agent base data transmission in MANET. Int. J. Adv. Res. Comput. Sci. (IJARCS), 4(8) (2013). ISSN 0976-5697
Mandal, J.K., Hassan, K.L.: Agent based Intrusion Detection System in MANET. In: Proceedings of Third International Conference on Computer Science & Information Technology (CCSIT 2013). LNICST, Bangalore, India, 18–20 February 2013, p. 76. Springer (2013). ISSN 1867-8211
Dokurer, S., Ert, Y.M., Acar, C.E.: Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings, pp. 148–153. IEEE (2007)
Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. www.cs.ucsb.edu/~ebelding/txt/wmcsa99.pdf. Accessed 8 June 2015
Deng, H., Li, W., Agrawal, D.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)
Al-Shurman, M., Yoo, S., Park, S.: Black hole attack in mobile ad hoc networks. In: ACM Southeast Regional Conference, pp. 96–97 (2004)
Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad-hoc networks. IEEE Wirel. Commun. 11, 48–60 (2004)
Usha, B.: Understanding black hole attack in MANET. Eur. J. Sci. Res. 83(3), 383–396 (2012). ISSN 1450-216X
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM (2000)
Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. 9, 545–556 (2003). Kluwer Academic Publishers
Huang, Y.-A., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: SASN 2003 Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp 135–147 (2003)
Nadeem, A., Howarth, M.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)
Korba, A.A., Nafaa, M., Ghamri-Doudane, Y.: Anomaly-based intrusion detection system for ad hoc networks. In: 2016 7th International Conference on Network of the Future (NOF), Rio de Janeiro, Brazil, 16–18 November 2016. IEEE (2016). Electronic ISBN 978-1-5090-4671-3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hassan, K.L., Bera, S., Bag, P. (2017). Agent Based IDS Using RMBOPB Technique in MANET. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_28
Download citation
DOI: https://doi.org/10.1007/978-981-10-6427-2_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6426-5
Online ISBN: 978-981-10-6427-2
eBook Packages: Computer ScienceComputer Science (R0)