Black hole detection using evolutionary algorithm for IDS/IPS in MANETs

Mobile ad hoc network (MANET) is a self organized structure of mobile nodes which are distributed unevenly in the environment. There are various MANET routing protocols exist which cannot stand against the security issues which might occur inside or outside of the MANET environment. Black hole attack is most popular insider attack happening on the MANET environment which needs to be concerned more to avoid the unwanted packet loss. These problems are resolved in the proposed research method by introducing new method namely hybridization of particle swarm optimization with genetic algorithm (HPSO-GA) routing system. The main contribution of this research method is to detect the black hole attack (BHA) by utilizing ad hoc on demand distance vector (AODV) routing protocol. This method utilizes the data routing information (DRI) of the neighbouring nodes instead of considering source node information. DRI information are gathered from every neighbouring nodes which increases the probability of attack detection accuracy. The suggested HPSO-GA routing mechanism researches the black hole attack in MANET, at that point, the outputs were measured utilizing the parameters namely detection rate, false positive alarm (FPA), packet delivery ratio (PDR), routing overhead, average end to end delay and throughput. The outcomes are contrasted with existing techniques, like, AODV, local intrusion detection (LID) with AODV. Simulation output utilizing the network simulator demonstrates that the improvement ratio of the throughput picked up by HPSO-GA security routing mechanism and general improvement reduction at end-to-end delay and routing overhead.

[1]  Harish Kumar,et al.  Effect Of Black Hole Attack On AODV Routing Protocol In , .

[2]  Raed A. Alsaqour,et al.  A local intrusion detection routing security over MANET network , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.

[3]  Lalit Himral,et al.  Preventing AODV Routing Protocol from Black Hole Attack , 2011 .

[4]  Prodipto Das,et al.  Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.

[5]  Keecheon Kim,et al.  Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[6]  Ya-Jung Lee,et al.  Stacking sequence optimization of laminated composite structures using genetic algorithm with local improvement , 2004 .

[7]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[8]  Stephen Chen,et al.  Particle swarm optimization with pbest crossover , 2012, 2012 IEEE Congress on Evolutionary Computation.

[9]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[10]  Erwie Zahara,et al.  A hybrid genetic algorithm and particle swarm optimization for multimodal functions , 2008, Appl. Soft Comput..

[11]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[12]  Elsayed Radwan,et al.  Intrusion Detection Using Rough Sets based Parallel Genetic Algorithm Hybrid Model , 2009 .

[13]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[14]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[15]  Mehdi Medadian,et al.  Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).

[16]  Sunil Taneja,et al.  A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .

[17]  An Adaptive Blind Channel Estimation of OFDM System by Worst Case H∞ Approach , 2009 .

[18]  Jiangye Yuan,et al.  A modified particle swarm optimizer with dynamic adaptation , 2007, Appl. Math. Comput..

[19]  Dong Seong Kim,et al.  A Survey and Taxonomy of Lightweight Intrusion Detection Systems , 2012, J. Internet Serv. Inf. Secur..

[20]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[21]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[22]  I. Raza,et al.  A Trust based Security Framework for Pure AODV Network , 2007, 2007 International Conference on Information and Emerging Technologies.

[23]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[24]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[25]  Dan Boneh,et al.  On genetic algorithms , 1995, COLT '95.