IJCNIS Vol. 14, No. 2, 8 Apr. 2022
Cover page and Table of Contents: PDF (size: 612KB)
Full Text (PDF, 612KB), PP.1-13
Views: 0 Downloads: 0
Authentication Technique, Intrusion Detection System (IDS), Distributed Monitoring, Mobile Ad-Hoc Network (MANET)
In a Mobile Ad hoc Network (MANET), mobile nodes play multiple roles as hosts and routers and are dynamically changing multi-hop structures. MANET consists only of wireless nodes with limit processing power, and routing and data transfer are performed through cooperation with each other. It is exposed to many attack threats due to the dynamic topology by the movement of the nodes and the characteristic of multi-hop communication. Therefore, in MANET, a technique that can detect effectively must be applied while detecting malicious nodes and reducing the impact of various attacks. In this paper, we propose an trust based authentication technique for nodes and a distributed monitoring technique to improve the detection performance of malicious nodes. The hierarchical cluster structure was used to improve authentication of nodes and detection performance and management efficiency of malicious nodes. A lightweight authentication technique of member nodes in the cluster was applied and the efficiency of node authentication was improved. It was used to determine whether it was an attack node by transmitting traffic monitoring information for neighbor nodes to CA and using. In addition, the efficient authentication technique using only key exchange without anyone's help was applied in order to provide integrity when exchanging information between cluster heads. Through this, it was possible to be free from trust information about nodes and forgery and falsification of information about attack nodes. The superiority of the technique proposed in this paper was confirmed through comparative experiments with the existing intrusion detection technique.
Hwanseok Yang, "A Study on Performance Improvement of Intrusion Detection using Efficient Authentication and Distributed Monitoring", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.2, pp.1-13, 2022. DOI: 10.5815/ijcnis.2022.02.01
[1] Kukreja, D., U. Singh, and B. Reddy, “A survey of trust based routing protocols in MANETs,” Journal of Advances in Computer Networks, 1(4), 2013, pp. 280-285.
[2] Del-Valle-Soto, Carolina, Mex-Perera, Carlos, Monroy, Raul, Nolazco-Flores, Juan Arturo, “On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks,” Sensors, Vol. 15, 2015, pp. 7619-7649.
[3] Saudi, N.A.M., et al., “Mobile Ad-Hoc Network (MANET) Routing Protocols,” in Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017): Transcending Boundaries, Embracing Multidisciplinary Diversities, Springer, 2019.
[4] Das, M. Venkat, P. Premchand, and L. R. Raju., "Security Enhancing based on Node Authentication and Trusted Routing in Mobile Ad Hoc Network (MANET)," Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12.14, 2021, pp. 5199-5211.
[5] Singh, V.; Singh, D.; Hassan, M.M., “Survey: Black Hole Attack Detection in MANET,” In Proceedings of the 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), Sultanpur, India, 8–9 February 2019.
[6] Yang, Hwanseok, "A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network," Journal of Korea Society of Digital Industry and Information Management 14.1, 2018, pp. 35-43.
[7] Kaur, Gunseerat, and Poonam Thakur., "Routing Protocols in MANET: An Overview," 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Vol. 1, IEEE, 2019.
[8] Saudi, N.A.M., et al., “Mobile Ad-Hoc Network (MANET) Routing Protocols,” in Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017): Transcending Boundaries, Embracing Multidisciplinary Diversities, Springer, 2019.
[9] Mohamed, Salma S., A. I. Abd-Elfattah, and Mohamed A. Mohamed. "A new clustering technique based on replication for MANET routing protocols." TELKOMNIKA 18.6, 2020, pp. 3339-3345.
[10] Yadav, Neha, and Urvashi Chug., "Secure Routing in MANET: A Review," 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon). IEEE, 2019.
[11] Moudni, H., et al., “Performance analysis of AODV routing protocol in MANET under the influence of routing attacks,” in 2016 International Conference on Electrical and Information Technologies (ICEIT), IEEE, 2016.
[12] Prasath, N., and J. Sreemathy, "Optimized dynamic source routing protocol for MANETs," Cluster Computing 22.5, 2019, pp. 12397-12409.
[13] Wahi, Charu, Shampa Chakraverty, and Vandana Bhattacherjee, "A trust-based secure AODV routing scheme for MANET," International Journal of Ad Hoc and Ubiquitous Computing 38.4, 2021, pp. 231-247.
[14] Jain, Pragati, and Akash Sanghi, "Review of Various Routing Protocols in Mobile Adhoc Networks (MANETs)," International Journal of Innovations & Advancement in Computer Science, 2018, pp. 45-54.
[15] Bhardwaj, Diwakar, Krishna Kant, and Durg Singh Chauhan, "QoS-aware routing protocol using adaptive retransmission of distorted descriptions in MDC for MANETs," International Journal of Ad Hoc and Ubiquitous Computing 28.1, 2018, pp. 55-67.
[16] Halhalli, Suresh R., Shounak Rushikesh Sugave, and B. N. Jagdale, "Optimisation driven-based secure routing in MANET using atom whale optimisation algorithm," International Journal of Communication Networks and Distributed Systems 27.1, 2021, pp. 77-99.
[17] Ram, Anant, Jagrati Kulshrestha, and Vishesh Gupta, "Secure Routing-Based AODV to Prevent Network from Black Hole Attack in MANET," Proceedings of 6th International Conference on Recent Trends in Computing. Springer, Singapore, 2021.
[18] Alappatt, Valanto, and Joe Prathap PM. "Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E." International Journal of Computer Networks and Applications 8.4 , 2021, pp. 400-411.
[19] Li, Xiaochen, et al. "Secrecy transmission capacity in mobile ad hoc networks with security-aware Aloha protocol." IET Communications 14.22, 2020, pp. 4135-4141.
[20] Kim, Jinhong, and Jong-Yun Kim, "Wireless Ad Hoc Network based Routing Attack Authentication Mechanism." Advances in Natural and Applied Sciences 14.1, 2020, pp. 224-230.
[21] Kamboj, Nippun, and Munishwar Rai, "A new secure ad-hoc on demand distance vector routing protocol to ensure less power consumption in mobile ad-hoc network," Journal of Computational and Theoretical Nanoscience 17.6, 2020, pp. 2483-2487.
[22] Barik, Lalbihari, "A Survey on Detecting Co-Operative Black Hole Attack on Multicast in Mobile Ad-Hoc Network," International Journal of Current Engineering and Scientific Research 5.11, 2018, pp. 149-155.
[23] Desai, Aneri Mukeshbhai, and Rutvij H. Jhaveri, "Secure routing in mobile Ad hoc networks: A predictive approach," International Journal of Information Technology 11.2, 2019, pp. 345-356.
[24] Gupta, Prakhar, et al., "Reliability factor based AODV protocol: Prevention of black hole attack in MANET," Smart Innovations in Communication and Computational Sciences. Springer, Singapore, 2019, pp. 271-279.
[25] Panda, Niranjan, and B. Kumar Pattanayak. "Energy aware detection and prevention of black hole attack in MANET." International Journal of Engineering and Technology (UAE) 7.2.6, 2018, pp. 135-140.
[26] Suma, R., B. G. Premasudha, and V. Ravi Ram. "A novel machine learning-based attacker detection system to secure location aided routing in MANETs." International Journal of Networking and Virtual Organisations 22.1, 2020, pp. 17-41.
[27] Farheen, NS Saba, and Anuj Jain, "Improved Routing in MANET with Optimized Multi path routing fine tuned with Hybrid modeling," Journal of King Saud University-Computer and Information Sciences (2020).