Efficient Intrusion detection of malicious node using Bayesian Hybrid Detection in MANET

In the past several years there have been considerable interest developed towards study on distributed networks. The key underlying application under such technology is mobile ad hoc networks (MANETs), which have been exploiting the range of research opportunity. In MANET due to infrastructure less network and dynamic topology changes, security becomes one of the important issues. The defense strategies such as intrusion detection system (IDS) impose a method to build efficient detection of malicious nodes. Game theory is mainly used to study security problems identification in MANET. The Bayesian Hybrid Detection (BHD) is applied to detect the malicious nodes. A BHD allows the defender to adjust based on opponent observation. The simulation is carried out using the MATLAB for malicious nodes detection. The security degree is measured by the payoff index and system stability index (SSI). Also the processing vs. accuracy index level is measured to identify reliability of detection. The proposed system enables for enhancing security in MANET’s by modeling the interactions among a malicious node with number of legitimate nodes. This is suitable for future works on multilayer security problem in MANET.

[1]  Xian-Wei Zhou,et al.  A cooperative differential game model based on transmission rate in wireless networks , 2010, Oper. Res. Lett..

[2]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[3]  Prabir Bhattacharya,et al.  A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..

[4]  Zhu Han,et al.  Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[5]  V. Sangeetha,et al.  ZIDS: Zonal-based Intrusion Detection System for studying the malicious node behaviour in MANET , 2015, 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT).

[6]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[7]  Benxiong Huang,et al.  COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..

[8]  Paolo Santi,et al.  A Two-Dimensional Geometry-Based Stochastic Model , 2012, IEEE Transactions on Wireless Communications.

[9]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[10]  Petteri Nurmi,et al.  Modelling routing in wireless ad hoc networks with dynamic Bayesian games , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[11]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[12]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[13]  Marjan Kuchaki Rafsanjani,et al.  An Optimal Method for Detecting Internal and External Intrusion in MANET , 2010, FGIT-FGCN.

[14]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[15]  Jie Liu,et al.  Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[16]  Yunhao Liu,et al.  Energy-Efficient Neighbor Discovery in Mobile Ad Hoc and Wireless Sensor Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[17]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[18]  N. Marchang,et al.  A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[19]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[20]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.