Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN)
Syed Muqtar Ahmed1 , Syed Abdul Sattar2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 77-82, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.7782
Online published on Nov 30, 2018
Copyright © Syed Muqtar Ahmed, Syed Abdul Sattar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar, “Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN),” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.77-82, 2018.
MLA Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar "Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN)." International Journal of Computer Sciences and Engineering 6.11 (2018): 77-82.
APA Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar, (2018). Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN). International Journal of Computer Sciences and Engineering, 6(11), 77-82.
BibTex Style Citation:
@article{Ahmed_2018,
author = {Syed Muqtar Ahmed, Syed Abdul Sattar},
title = {Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {77-82},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3127},
doi = {https://doi.org/10.26438/ijcse/v6i11.7782}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.7782}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3127
TI - Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN)
T2 - International Journal of Computer Sciences and Engineering
AU - Syed Muqtar Ahmed, Syed Abdul Sattar
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 77-82
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
793 | 727 downloads | 330 downloads |
Abstract
Presenting cutting edge research- A mobile Adhoc network is a collection of wireless devices in which nodes interact with each other in a tentative topology without using pre-defined infrastructure. Almost all networks are protected using multilayer firewalls and encryption methods, but many of them are not so effective. Therefore we proposed a Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN) to detect anomalies for multi-hop networks. The purpose of this paper is to design a detail architecture of Analysis Process that operates on simple rules including four different phases namely Event management, Authentication, Duplicate request generation and Message alert monitoring phase to detect the malicious node. This paper also conducted the simulation of proposed RDIDS-WMAN with a combination of AODV protocol to show its effectiveness and resists the attacks. Meanwhile, the performance of network, such as Packet Delivery Ratio, Average End-to-End delay, Throughput and Packet Drop Ratio is tolerable according to the NS-2.35 simulation results. Our solution also uses an authentication process with hash method.
Key-Words / Index Term
MANET, AODV, RDIDS-WMAN, Multi-hop network, Authentication, Intusion
References
[1]. J. Srilakshmi1, S.S.S.N. Usha Devi N2, “Secure and Efficient Multipath Routing Using Overlay Nodes”, International Journal of Scientific Research. Computer Science and Engineering, Vol.6, Issue 5, pp.16-19, October 2018.
[2]. Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Scientific Research in Network Security and Communication”, Vol. 6, Sp.issue.01, pp.1-5, January 2018.
[3]. Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala “DOS Attacks in Mobile Ad-hoc Networks: A Survey”, In the Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies, India, Pages 535-541, 2012.
[4]. Swaijit Kaushal, Reena Aggarwal,“ A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 4 Issue 2, February 2015.
[5]. Naveen Bilandi and Harsh K Verma, “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET”, International Journal of Electronics and Computer Science Engineering Vol. 1, Issue 3, pp.1660-1667,
[6]. Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, USA, Pages 135-147, 2003.
[7] D. Djenouri and N. Badache, “Struggling against selfishness and black hole attacks in MANET”, Wireless Communication. Mobile Computing, vol. 6, pp. 689–704, 2008.
[8] Morigere Subramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T,”Scenario Based Study of on demand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards”, Vol. 1(2), 128-135, November 2011.
[9] Ms. Nidhi Sha rma and Mr. A. Sharma, “The Black-hole node attack in MANET”, Proceedings of 2012 Second International Conference on Advanced Computing & Communication Technologies, pp. 546-548, 2012.
[10] S. D. Manikantan, C. Yu and A. Trisha, “Channel-aware detection of gray hole attacks in wireless mesh networks”, IEEE global telecommunications conference, pp. 1–6, December 2009.