Skip to main content
Log in

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet dropping attack, Sybil attack, and flooding attack. Therefore, the wireless network should be protected using encryption, firewalls, detection schemes to identify the attackers and decreasing their impact on the network. So, it’s an essential task to design the intelligent intrusion detection system. This research work deals with designing the multilevel trust based intelligence intrusion detection system with cryptography schemes for detecting the attackers. In order to identify the attackers, we propose a novel trust management with elliptic curve cryptography (ECC) algorithm. At first, a trust manager is maintained, its functions is to classify the trust into three different sets of trust level based upon the elliptic curve cryptography and Schnorr’s signature in the MANET. Each trust level has identified a single attacker. Thus, the proposed method has detected three types of attackers such as black hole attack, flooding attack and selective packet dropping attack. Furthermore, it have provided countermeasure for these attackers in the MANET as well as improved performances. Hence, it obtains higher throughput, minimum delay, minimum packet loss and efficient end to end delivery in MANET. Thus, the proposed scheme is a secure and optimal solution to encounter attackers, which represents to be efficient and significant.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Siva Ram Murthy, C., Manoj, B.S.: Ad Hoc Wireless Networks, Architecture, and Protocols. Prentice Hall PTR, Upper Saddle River (2004)

    Google Scholar 

  2. Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networks. IEEE Press, Wiley (2003)

    Google Scholar 

  3. Aggelou, G., et al.: Mobile Ad Hoc Networks, 2nd edn. McGraw Hill Professional Engineering, Oxford (2004)

    Google Scholar 

  4. Chlamtac, I., Conti, M., Liu, J.J.-N.: Mobile ad hoc networking: imperatives and challenges. Elsevier Netw. Mag. 13, 13–64 (2004)

    Google Scholar 

  5. Belding-Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Pers. Commun. Mag. 6(2), 46–55 (1999)

    Article  Google Scholar 

  6. Banerjee, S.: Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proceedings of the World Congress on Engineering and Computer Science (2008)

  7. Jain, S., Jain, M., Kandwal, H.: Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. J. Comput. Appl. 1(7), 37–42 (2010)

    Google Scholar 

  8. Agrawal, P., Ghosh, R.K., Das, S.K.: Cooperative black and gray hole attacks in mobile ad hoc networks. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 310–314. Suwon, Korea (2008)

  9. Baadache, A., Belmehdi, A.: Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks. J. Comput. Sci. Inf. Secur. 7(1), 10–16 (2010)

    Google Scholar 

  10. Bace, R., et al.: An Introduction to Intrusion Detection & Assessment. Infidel Inc., prepared for ICSA Inc. Copyright 1998 (1998)

  11. Richard. M., et al.: Intrusion Detection FAQ: Are their limitations of Intrusion Signatures. http://www.sans.org/security-resources/idfaq/ limitations. PHP, April 5 (2001)

  12. Kozushko, H.: Intrusion detection: host based and network-based intrusion detection systems. Indep. Study 11, 1–23 (2003)

    Google Scholar 

  13. Abraham, A., et al.: SCIDS: a soft computing intrusion detection system. In: WDC 2004. LNCS, School of Computer Science and Engineering, Chung-Ang University, Korea, Springer, Berlin, Heidelberg, vol. 3326, pp. 252–257 (2004)

  14. Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201–2212 (2005)

    Article  Google Scholar 

  15. Abraham, A., Jain, R., Thomas, J., Han, S.Y.: D-SCIDS: distributed soft computing intrusion detection system. J. Netw. Comput. Appl. 30(82), 81–98 (2007)

    Article  Google Scholar 

  16. Hubballi, N., et al.: Fuzzy mega cluster based anomaly network intrusion detection, In: International Conference on Network and Service Security, 2009. N2S ’09. ISBN: 978-2-9532-4431-1 (2009)

  17. Wang, F., Chen, H., Zhao, J., Rong, C.: IDMTM: a novel intrusion detection mechanism based on trust model for ad hoc networks. In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, pp. 978, 984

  18. Gonzalez, O.F., Ansa, G., Howarth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng. 2(1), 181–192 (2008)

    Google Scholar 

  19. Nadeem, A., Howarth, M.: Adaptive intrusion detection & prevention of denial of service attacks in MANETs. In: ACM, 2009 (2009)

  20. Wei, Z., et al.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)

    Article  Google Scholar 

  21. Biwas, S., et al.: Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In: Applications and Innovations in Mobile Computing (AIMoC), 2014 (2014)

  22. Agarwal, U., Yadav, K.P., Tiwari, U.: Security threats in mobile ad hoc networks. Int. J. Res. Sci. Technol. 2(2), 53–64 (2015)

    Google Scholar 

  23. Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, New York (2009)

    Book  Google Scholar 

  24. Sajjad, S.M.: Neighbor node trust based intrusion detection system for WSN. In: 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN-2015 (2015)

Download references

Acknowledgements

Authors are highly thankful to the Department of RIC, IKG Punjab Technical University, Kapurthala, Punjab, India for providing the opportunity to conduct this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Opinder Singh.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, O., Singh, J. & Singh, R. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21, 51–63 (2018). https://doi.org/10.1007/s10586-017-0927-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0927-z

Keywords

Navigation