Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule

The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security issues in the network and most of the Intrusion detection methods concentrated on the energy dissipation and obtained better results, whereas the trust remained a hectic factor. This paper proposes a trust-aware scheme to detect the intrusion in the MANET. The proposed Trust-aware fuzzy clustering and fuzzy Naive Bayes (trust-aware FuzzyClus-Fuzzy NB) method of detecting the intrusion is found to be effective. The fuzzy clustering concept determines the cluster-head to form the clusters. The proposed BDE-based trust factors along with the direct trust, indirect trust, and the recent trust, hold the information of the nodes and the fuzzy Naive Bayes determine the intrusion in the nodes using the node trust table. The simulation results convey the effectiveness of the proposed method and the proposed method is analyzed based on the metrics, such as delay, energy, detection rate, and throughput. The delay is in minimum at a rate of 0.00434, with low energy dissipation of 9.933, high detection rate of 0.623, and greater throughput of 0.642.

[1]  Shadi Aljawarneh,et al.  Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency , 2017, Sustain. Comput. Informatics Syst..

[2]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[3]  Mario Gerla,et al.  On-demand routing in large ad hoc wireless networks with passive clustering , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[4]  Sujanavan Tiruvayipati,et al.  Anomaly Detection System in a Cluster Based MANET , 2017 .

[5]  Hesham A. Ali,et al.  An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks , 2016, J. Netw. Comput. Appl..

[6]  Jiamin Li,et al.  Fuzzy Clustering Algorithms — Review of the Applications , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[7]  Govindaraju Radhamani,et al.  Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks , 2015, Journal of Communications and Networks.

[8]  Qinglin Zhao,et al.  Support for spot virtual machine purchasing simulation , 2018, Cluster Computing.

[9]  Sushanta Karmakar,et al.  Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .

[10]  P. Kuppusamy,et al.  Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network , 2012 .

[11]  Geoffrey Ye Li,et al.  A survey of energy-efficient wireless communications , 2013, IEEE Communications Surveys & Tutorials.

[12]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[13]  Ahmet Rizaner,et al.  A novel support vector machine based intrusion detection system for mobile ad hoc networks , 2017, Wireless Networks.

[14]  Sajal K. Das,et al.  A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[15]  S. Saravana Kumar,et al.  Dynamic anomaly detection using cross layer security in MANET , 2017, Comput. Electr. Eng..

[16]  Kathiravan Kannan,et al.  Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks , 2016 .

[17]  Deborah Estrin,et al.  Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table , 2003, Mob. Networks Appl..

[18]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..

[19]  Saravanan Kumarasamy,et al.  Cluster Based Cost Efficient Intrusion Detection System For Manet , 2013, ArXiv.

[20]  Chung-Ta King,et al.  On state maintenance in cluster-based mobile ad-hoc networks , 2017, Ad Hoc Networks.

[21]  Karl N. Levitt,et al.  Distributed intrusion detection models for mobile ad hoc networks , 2006 .

[22]  Naonori Kakimura,et al.  Maximum lifetime coverage problem with battery recovery effect , 2018, Sustain. Comput. Informatics Syst..

[23]  Ravinder Singh,et al.  Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.

[24]  Wen-Kuang Kuo,et al.  Energy Efficiency Optimization for Mobile Ad Hoc Networks , 2016, IEEE Access.

[25]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).