Abstract
Mobile Ad hoc Networks (MANETs) have gained great interests owing to their dynamic and smoothness of exploitation. Conversely, the wireless and energetic nature adds exposed to different types of protection attacks than the other kind of networks. In this kind of attacks, it is essential to expand proficient intrusion-detection system to prevent MANET from different attacks. In this paper, we recommend a new intrusion-detection system called Modified Zone Based Intrusion Detection System (MZBIDS) for MANETs. Evaluated to contemporary methodologies, MZBIDS exhibits superior malicious behavior-detection ratios in convinced situations whereas it may not significantly influence performance of entire network.
Similar content being viewed by others
References
Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless (Vol. 5, pp. 153–181). Norwell: Kluwer.
Kenkre, P. S., Pai, A., & Colaco, L., (2015), Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405–411). Springer.
Stakhanova, N., Basu, S., & Wong, J. (2006). Taxonomy of intrusion response systems. Computer Science, Iowa State University, Technical report 06-05.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.
Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials,17(4), 2461–2492.
Faisal, M., Abbas, S., & Rahman, H. U. (2018). Identity attack detection system for 802.11-based ad hoc networks. EURASIP Journal on Wireless Communications and Networking,10(1), 128.
Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks,9(16), 3049–3058.
Robinson, Y. H., Julie, E. G., Kumar, R., & Son, H. L. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Applications, 12(5), 1061–1075.
Robinson, Y. H., Julie, E. G., Saravanan, K., Kumar, R., & Son, H. L. (2019). FD-AOMDV: Fault- tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1126-3.
Robinson, Y. H., Krishnan, R. S., Julie, E. G., Kumar, R., Son, H. L., & Thong, P. H. (2019). Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad hoc networks. Ad Hoc Networks,93, 101896–101909.
Robinson, Y. H., Julie, E., Kumar, R., & Son, L. H. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Application,12(5), 1061–1075.
Silva, A. A., Pontes, E., Guelfi, A. E., Caproni, I., Aguiar, R., Zhou, F., et al. (2015). Redicting model for identifying the malicious activity of nodes in MANETs. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC) (pp. 700–707).
Kalnoor, G., & Agarkhed, J. (2018). Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J,4(1), 00093.
Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2017). Framework for threat analysis and attack modelling of network security protocols. International Journal of Synthetic Emotions (IJSE),8(2), 62–75.
Debar, H., & Wespi, A. (2001). Aggregation and correlation of intrusion-detection alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (pp. 85–103).
Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., & Moradzadeh, H. (2014). Intrusion detection systems in MANET: a review. Procedia-Social and Behavioral Sciences,129, 453–459.
Thalor, J., & Monika, M. (2013). Wormhole attack detection and prevention technique in mobile ad hoc networks: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 137–142.
Manju, B., Sandhya, S. G., Ramkuma, M. O., & Jayakumar, D. (2018). An efficient and secured monitoring system to identify the selfish node in MANET. International Journal of Pure and Applied Mathematics,118(15), 271–276.
Justin, V., Marathe, N., & Dongre, N. (2017). Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In International conference on I-SMAC. IEEE Xplore
Chen, T., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9.
Gour, N., Agarwal, M., Singh, H., & Kumar, A. (2014), A review on impersonation attack in mobile Ad-Hoc Network. International Journal of Computer Trends and Technology (IJCTT), 8(1).
Barani, F., & Abadi, M. (2012). BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. The ISC International Journal of Information Security,4(1), 25–39.
Sen, B., Meitei, M. G., Sharma, K., Ghose, M. K., & Sinha, S. (2018). Mitigating black hole attacks in MANETs using a trust-based threshold mechanism. International Journal of Applied Engineering Research,13(7), 5458–5463.
Amouri, A., Jaimes, L. G., Manthena, R., Morgera, S.D., Vergara-Laurens, I. J. (2015). A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET. In Proceedings of the 7th IEEE Latin-American Conference on Communications (LATINCOM), Arequipa, Peru (pp. 1–6).
Cuppens, F. (2001). Managing alerts in a multi-intrusion detection environment. In 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 10–14
Robinson, Y. H., & Julie, E. G. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-019-06588-4.
Cuppens, F., & Mige, A. (2002). Alert correlation in a cooperative intrusion detection framework (pp. 202–215). Berkeley, CA: IEEE Symposium on Security and Privacy.
Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues,7(4), 12–17.
Almomani, O., Al-Shugran, M., Alzubi, J. A., & Alzubi, O. A. (2015). Performance evaluation of position-based routing protocols using different mobility models in MANET. International Journal of Computer Applications, 119(3), 43–48.
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.
Sun, B., Wu, K., & Pooch, U. W. (2006). Zone-based intrusion detection for mobile ad hoc networks. Ad hoc & sensor wireless networks,2(3), 297–324.
Jiang, H., Gao, Y., Zhang, G., & He, Y. (2005). A zone-based intrusion detection system for wireless ad hoc distribution power communication networks. In IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific, Dalian.
Gheisari, M., Alzubi, J., Zhang, X., Kose, U., & Saucedo, J. A. M. (2019). A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wireless Networks. https://doi.org/10.1007/s11276-019-01982-z.
Amouri, A., Morgera, S., Bencherif, M., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors (pp. 1–17)
Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., & Thong, P. H. (2019). Design of a security-aware routing scheme in Mobile Ad-hoc network using repeated game model. Computer Standards & Interfaces,66, 103358.
Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks (In press), corrected proof, Available online 2 February 2019.
Condomines, J. P., Zhang, R., & Larrieu, N. (2018). Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks (in press), corrected proof, Available online 7 September 2018.
Saravanan, K., Aswini, S., Kumar, R., & Son, H. L. (2019). How to prevent maritime border collision for fisheries?-A design of real-time automatic identification system. Earth Science Informatics,12(2), 241–252.
Garg, R., Mittal, M., & Son, H. L. (2019). Reliability and energy efficient workflow scheduling in cloud environment. Cluster Computing. https://doi.org/10.1007/s10586-019-02911-7.
Kapoor, R., Gupta, R., Son, H. L., Jha, S., & Kumar, R. (2019). Adaptive technique with cross correlation for lowering signal-to-noise ratio wall in sensor networks. Wireless Personal Communications,105(3), 787–802.
Krishnan, R. S., Julie, E. G., Robinson, Y. H., Son, H. L., Kumar, R., Abdel-Basset, M., et al. (2019). A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access,7, 38584–38592.
Manjul, M., Mishra, R., Singh, K., Son, H. L., Abdel-Basset, M., & Thong, P. H. (2019). Single rate based extended logarithmic multicast congestion control. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01340-z
Pal, S., Kumar, R., Son, H. L., Saravanan, K., Abdel-Basset, M., Manogaran, G., & Thong, P. H. (2019) Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud. The Journal of Supercomputing, 1–18.
Pritam, N., Khari, M., Son, H. L., Kumar, R., Jha, S., Priyadarshini, I., et al. (2019). Assessment of code smell for predicting class change proneness using machine learning. IEEE Access,7, 37414–37425.
Son, L. H., & Thong, P. H. (2017). Soft computing methods for WiMax network planning on 3D geographical information systems. Journal of Computer and System Sciences,83(1), 159–179.
Jha, S., Kumar, R., Chatterjee, J. M., & Khari, M. (2019). Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017. Telecommunication Systems,70(4), 617–634.
Son, P. H., Son, H. L., Jha, S., Kumar, R., & Chatterjee, J. M. (2019). Governing mobile virtual network operators in developing countries. Utilities Policy,56, 169–180.
Tam, N. T., Hai, D. T., Son, H. L., & Vinh, T. L. (2018). Improving lifetime and network connections of 3D wireless sensor networks based on fuzzy clustering and particle swarm optimization. Wireless Networks,24(5), 1477–1490.
Jha, S., Kumar, R., Son, H. L., Abdel-Basset, M., Priyadarshini, I., Sharma, R., et al. (2019). Deep learning approach for software maintainability metrics prediction. IEEE Access,7, 61840–61855.
Khan, T., Singh, K., Son, H. L., Abdel-Basset, M., Long, H. V., Singh, S. P., et al. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access,7, 58221–58240.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Krishnan, R.S., Julie, E.G., Robinson, Y.H. et al. Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Netw 26, 1275–1289 (2020). https://doi.org/10.1007/s11276-019-02151-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-019-02151-y