Cluster based energy efficient authentication scheme for secure IDS over MANET

Mobile ad-hoc networks (MANET) are self-discipline and dynamic infrastructure and less wireless networks than nodes are in themselves to have routing capability. Intrusion Detection Systems (EDIS) at MANET are required to monitor activities and detect any interference or weakness in the network. In this paper we present an effective probability-based cluster model for intrusion detection systems that need to remain active in a dedicated mobile network. The suggested probabilistic model is the use of cluster-based collaboration between IDS among district nodes to reduce individual overhead to maintain successful communication. IDSs typically examine each node to monitor the behavior of the network, which maintains the overhead of a battery device in terms of power and computing resources. Therefore, in this article our goal is to limit the upper control packet of IDS without compromising its effectiveness. To validate the proposed model, the paper interactions model between the Ids game and the cluster cluster in a multiplayer multiplayer game in which players have partially cooperative and partially conflicting goals and use K-mean blocks. This article theoretically analyzes this game and the game group supports it with simulation results.

[1]  Smita M. Nirkhi,et al.  Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining , 2011 .

[2]  Marianne Azer Wormhole Attacks Mitigation in Ad Hoc Networks , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[3]  Z. Narmawala Survey of Applications of Network Coding in Wired and Wireless Networks , 2007 .

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Srivastava Sumit,et al.  Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).

[6]  Kenneth G. Paterson,et al.  Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[7]  Sajjad Abazari Aghdam,et al.  Collaborative techniques for detecting wormhole attack in MANETs , 2011, 2011 International Conference on Research and Innovation in Information Systems.

[8]  Durgesh Kumar Mishra,et al.  Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[9]  A. Kumar,et al.  A complete, efficient and lightweight cryptography solution for resource contrainst Mobile Ad-Hoc Networks , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[10]  M. K. Verma,et al.  A survey on: An analysis of secure routing of volatile nodes in MANET , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).

[11]  Robert C. Green,et al.  Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[12]  Kalyani C. Waghmare,et al.  Intrusion Detection System Using Data Mining Technique : Support Vector Machine , 2013 .

[13]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[14]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[15]  Sajal K. Das,et al.  A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[16]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  K. Selvakumar,et al.  A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (MANET) , 2014, Int. J. Parallel Emergent Distributed Syst..

[18]  Shailesh Singh Panwar,et al.  DATA REDUCTION TECHNIQUES TO ANALYZE NSL-KDD DATASET , 2014 .

[19]  Taran Singh Bharati,et al.  Secure intrusion detection system for mobile adhoc networks , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[20]  Dahai Du,et al.  A dynamic key management scheme for MANETs , 2011, Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference.