PROPOSING A DISTRIBUTED MODEL FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK USING NEURAL FUZZY INTERFACE

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as our architecture engine. Our scrutiny showed that fuzzy-neural interface had a good ability for separating normal data from abnormal. The ability of proposed architecture was evaluated in accuracy and overhead case.

[1]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[2]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[3]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[4]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[5]  Ji Luo,et al.  An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks , 2006, Fuzzy Sets Syst..

[6]  Sehun Kim,et al.  A cooperative-sinkhole detection method for mobile ad hoc networks , 2010 .

[7]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[8]  Erman Ayday,et al.  A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.

[9]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[10]  Christos Xenakis,et al.  A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..

[11]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[12]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[13]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[14]  Christos Douligeris,et al.  LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.

[15]  Shiyong Zhang,et al.  Flooding attack and defence in Ad hoc networks , 2006 .

[16]  Djamel Djenouri,et al.  On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.

[17]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[18]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[19]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[20]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[21]  Nick Antonopoulos,et al.  Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..

[22]  S. A. M. Makki,et al.  The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) , 2004, Security and Management.

[23]  Jyh-Shing Roger Jang,et al.  ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..