Skip to main content
Log in

Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile Ad hoc Networks (MANETs) have gained great interests owing to their dynamic and smoothness of exploitation. Conversely, the wireless and energetic nature adds exposed to different types of protection attacks than the other kind of networks. In this kind of attacks, it is essential to expand proficient intrusion-detection system to prevent MANET from different attacks. In this paper, we recommend a new intrusion-detection system called Modified Zone Based Intrusion Detection System (MZBIDS) for MANETs. Evaluated to contemporary methodologies, MZBIDS exhibits superior malicious behavior-detection ratios in convinced situations whereas it may not significantly influence performance of entire network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless (Vol. 5, pp. 153–181). Norwell: Kluwer.

    Google Scholar 

  2. Kenkre, P. S., Pai, A., & Colaco, L., (2015), Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405–411). Springer.

  3. Stakhanova, N., Basu, S., & Wong, J. (2006). Taxonomy of intrusion response systems. Computer Science, Iowa State University, Technical report 06-05.

  4. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.

    Article  Google Scholar 

  5. Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials,17(4), 2461–2492.

    Article  Google Scholar 

  6. Faisal, M., Abbas, S., & Rahman, H. U. (2018). Identity attack detection system for 802.11-based ad hoc networks. EURASIP Journal on Wireless Communications and Networking,10(1), 128.

    Article  Google Scholar 

  7. Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks,9(16), 3049–3058.

    Article  Google Scholar 

  8. Robinson, Y. H., Julie, E. G., Kumar, R., & Son, H. L. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Applications, 12(5), 1061–1075.

  9. Robinson, Y. H., Julie, E. G., Saravanan, K., Kumar, R., & Son, H. L. (2019). FD-AOMDV: Fault- tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1126-3.

    Article  Google Scholar 

  10. Robinson, Y. H., Krishnan, R. S., Julie, E. G., Kumar, R., Son, H. L., & Thong, P. H. (2019). Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad hoc networks. Ad Hoc Networks,93, 101896–101909.

    Article  Google Scholar 

  11. Robinson, Y. H., Julie, E., Kumar, R., & Son, L. H. (2019). Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Networking and Application,12(5), 1061–1075.

    Article  Google Scholar 

  12. Silva, A. A., Pontes, E., Guelfi, A. E., Caproni, I., Aguiar, R., Zhou, F., et al. (2015). Redicting model for identifying the malicious activity of nodes in MANETs. In Proceedings of the IEEE Symposium on Computers and Communication (ISCC) (pp. 700–707).

  13. Kalnoor, G., & Agarkhed, J. (2018). Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J,4(1), 00093.

    Google Scholar 

  14. Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., & Barde, S. S. (2017). Framework for threat analysis and attack modelling of network security protocols. International Journal of Synthetic Emotions (IJSE),8(2), 62–75.

    Article  Google Scholar 

  15. Debar, H., & Wespi, A. (2001). Aggregation and correlation of intrusion-detection alerts. In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (pp. 85–103).

  16. Amiri, E., Keshavarz, H., Heidari, H., Mohamadi, E., & Moradzadeh, H. (2014). Intrusion detection systems in MANET: a review. Procedia-Social and Behavioral Sciences,129, 453–459.

    Article  Google Scholar 

  17. Thalor, J., & Monika, M. (2013). Wormhole attack detection and prevention technique in mobile ad hoc networks: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 137–142.

  18. Manju, B., Sandhya, S. G., Ramkuma, M. O., & Jayakumar, D. (2018). An efficient and secured monitoring system to identify the selfish node in MANET. International Journal of Pure and Applied Mathematics,118(15), 271–276.

    Google Scholar 

  19. Justin, V., Marathe, N., & Dongre, N. (2017). Hybrid IDS using SVM classifier for detecting DoS attack in MANET application. In International conference on I-SMAC. IEEE Xplore

  20. Chen, T., Blasco, J., Alzubi, J., & Alzubi, O. (2014). Intrusion detection. IET Publishing,1(1), 1–9.

    Google Scholar 

  21. Gour, N., Agarwal, M., Singh, H., & Kumar, A. (2014), A review on impersonation attack in mobile Ad-Hoc Network. International Journal of Computer Trends and Technology (IJCTT), 8(1).

  22. Barani, F., & Abadi, M. (2012). BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. The ISC International Journal of Information Security,4(1), 25–39.

    Google Scholar 

  23. Sen, B., Meitei, M. G., Sharma, K., Ghose, M. K., & Sinha, S. (2018). Mitigating black hole attacks in MANETs using a trust-based threshold mechanism. International Journal of Applied Engineering Research,13(7), 5458–5463.

    Google Scholar 

  24. Amouri, A., Jaimes, L. G., Manthena, R., Morgera, S.D., Vergara-Laurens, I. J. (2015). A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET. In Proceedings of the 7th IEEE Latin-American Conference on Communications (LATINCOM), Arequipa, Peru (pp. 1–6).

  25. Cuppens, F. (2001). Managing alerts in a multi-intrusion detection environment. In 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 10–14

  26. Robinson, Y. H., & Julie, E. G. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-019-06588-4.

    Article  Google Scholar 

  27. Cuppens, F., & Mige, A. (2002). Alert correlation in a cooperative intrusion detection framework (pp. 202–215). Berkeley, CA: IEEE Symposium on Security and Privacy.

    Google Scholar 

  28. Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues,7(4), 12–17.

    Google Scholar 

  29. Almomani, O., Al-Shugran, M., Alzubi, J. A., & Alzubi, O. A. (2015). Performance evaluation of position-based routing protocols using different mobility models in MANET. International Journal of Computer Applications, 119(3), 43–48.

  30. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.

    Article  Google Scholar 

  31. Sun, B., Wu, K., & Pooch, U. W. (2006). Zone-based intrusion detection for mobile ad hoc networks. Ad hoc & sensor wireless networks,2(3), 297–324.

    Google Scholar 

  32. Jiang, H., Gao, Y., Zhang, G., & He, Y. (2005). A zone-based intrusion detection system for wireless ad hoc distribution power communication networks. In IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific, Dalian.

  33. Gheisari, M., Alzubi, J., Zhang, X., Kose, U., & Saucedo, J. A. M. (2019). A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wireless Networks. https://doi.org/10.1007/s11276-019-01982-z.

    Article  Google Scholar 

  34. Amouri, A., Morgera, S., Bencherif, M., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors (pp. 1–17)

  35. Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., & Thong, P. H. (2019). Design of a security-aware routing scheme in Mobile Ad-hoc network using repeated game model. Computer Standards & Interfaces,66, 103358.

    Article  Google Scholar 

  36. Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks (In press), corrected proof, Available online 2 February 2019.

  37. Condomines, J. P., Zhang, R., & Larrieu, N. (2018). Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks (in press), corrected proof, Available online 7 September 2018.

  38. Saravanan, K., Aswini, S., Kumar, R., & Son, H. L. (2019). How to prevent maritime border collision for fisheries?-A design of real-time automatic identification system. Earth Science Informatics,12(2), 241–252.

    Article  Google Scholar 

  39. Garg, R., Mittal, M., & Son, H. L. (2019). Reliability and energy efficient workflow scheduling in cloud environment. Cluster Computing. https://doi.org/10.1007/s10586-019-02911-7.

    Article  Google Scholar 

  40. Kapoor, R., Gupta, R., Son, H. L., Jha, S., & Kumar, R. (2019). Adaptive technique with cross correlation for lowering signal-to-noise ratio wall in sensor networks. Wireless Personal Communications,105(3), 787–802.

    Article  Google Scholar 

  41. Krishnan, R. S., Julie, E. G., Robinson, Y. H., Son, H. L., Kumar, R., Abdel-Basset, M., et al. (2019). A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access,7, 38584–38592.

    Article  Google Scholar 

  42. Manjul, M., Mishra, R., Singh, K., Son, H. L., Abdel-Basset, M., & Thong, P. H. (2019). Single rate based extended logarithmic multicast congestion control. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01340-z

  43. Pal, S., Kumar, R., Son, H. L., Saravanan, K., Abdel-Basset, M., Manogaran, G., & Thong, P. H. (2019) Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud. The Journal of Supercomputing, 1–18.

  44. Pritam, N., Khari, M., Son, H. L., Kumar, R., Jha, S., Priyadarshini, I., et al. (2019). Assessment of code smell for predicting class change proneness using machine learning. IEEE Access,7, 37414–37425.

    Article  Google Scholar 

  45. Son, L. H., & Thong, P. H. (2017). Soft computing methods for WiMax network planning on 3D geographical information systems. Journal of Computer and System Sciences,83(1), 159–179.

    Article  MathSciNet  MATH  Google Scholar 

  46. Jha, S., Kumar, R., Chatterjee, J. M., & Khari, M. (2019). Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017. Telecommunication Systems,70(4), 617–634.

    Article  Google Scholar 

  47. Son, P. H., Son, H. L., Jha, S., Kumar, R., & Chatterjee, J. M. (2019). Governing mobile virtual network operators in developing countries. Utilities Policy,56, 169–180.

    Article  Google Scholar 

  48. Tam, N. T., Hai, D. T., Son, H. L., & Vinh, T. L. (2018). Improving lifetime and network connections of 3D wireless sensor networks based on fuzzy clustering and particle swarm optimization. Wireless Networks,24(5), 1477–1490.

    Article  Google Scholar 

  49. Jha, S., Kumar, R., Son, H. L., Abdel-Basset, M., Priyadarshini, I., Sharma, R., et al. (2019). Deep learning approach for software maintainability metrics prediction. IEEE Access,7, 61840–61855.

    Article  Google Scholar 

  50. Khan, T., Singh, K., Son, H. L., Abdel-Basset, M., Long, H. V., Singh, S. P., et al. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access,7, 58221–58240.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hoang Viet Long.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishnan, R.S., Julie, E.G., Robinson, Y.H. et al. Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Netw 26, 1275–1289 (2020). https://doi.org/10.1007/s11276-019-02151-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02151-y

Keywords

Navigation