Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET

Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet dropping attack, Sybil attack, and flooding attack. Therefore, the wireless network should be protected using encryption, firewalls, detection schemes to identify the attackers and decreasing their impact on the network. So, it’s an essential task to design the intelligent intrusion detection system. This research work deals with designing the multilevel trust based intelligence intrusion detection system with cryptography schemes for detecting the attackers. In order to identify the attackers, we propose a novel trust management with elliptic curve cryptography (ECC) algorithm. At first, a trust manager is maintained, its functions is to classify the trust into three different sets of trust level based upon the elliptic curve cryptography and Schnorr’s signature in the MANET. Each trust level has identified a single attacker. Thus, the proposed method has detected three types of attackers such as black hole attack, flooding attack and selective packet dropping attack. Furthermore, it have provided countermeasure for these attackers in the MANET as well as improved performances. Hence, it obtains higher throughput, minimum delay, minimum packet loss and efficient end to end delivery in MANET. Thus, the proposed scheme is a secure and optimal solution to encounter attackers, which represents to be efficient and significant.

[1]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[2]  Ivan Stojmenovic,et al.  Routing Approaches in Mobile AD HOC Networks , 2004 .

[3]  Abderrahmane Baadache,et al.  Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.

[4]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[5]  John A. Clark,et al.  Security Threats in Mobile Ad Hoc Networks , 2009 .

[6]  Sugata Sanyal,et al.  SCIDS: A Soft Computing Intrusion Detection System , 2004, IWDC.

[7]  Michael P. Howarth,et al.  Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.

[8]  Adel Nadjaran Toosi,et al.  A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..

[9]  Mohit Jain,et al.  The Intelligent Network , 1989, Springer Berlin Heidelberg.

[10]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[11]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[12]  Sarmistha Neogy,et al.  Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).

[13]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[14]  Godwin Ansa,et al.  Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks , 2008 .

[15]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[16]  Harley Kozushko,et al.  Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems , 2003 .

[17]  George Aggelou,et al.  Mobile Ad Hoc Networks , 2004 .

[18]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[19]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[20]  Kalyani Handal,et al.  Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .

[21]  Santosh Biswas,et al.  Fuzzy mega cluster based anomaly network intrusion detection , 2009, 2009 International Conference on Network and Service Security.

[22]  Jing Zhao,et al.  IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[23]  Muhammad Yousaf,et al.  Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.