Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
Security Key Management Model for Low Rate Wireless Personal Area Networks
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
This document proposes a hybrid intrusion detection system (HIDS) for wireless sensor networks. The HIDS combines cluster-based and rule-based intrusion detection techniques. It is designed to address the limited resources of sensor networks while achieving high detection rates and low false positives. The system works by using cluster heads to detect intrusions based on both anomaly detection and comparing activities to known attack behaviors. A simulation evaluated the HIDS and found it performed intrusion detection efficiently while being energy efficient and having a high detection rate.
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes and reviews several techniques for secure clustering in vehicular ad hoc networks (VANETs). It first provides background on VANETs and discusses why secure clustering is important. It then reviews five specific secure clustering techniques that have been proposed: 1) using public key infrastructure for key management between cluster heads, 2) Shamir's secret sharing scheme for data authentication, 3) using threshold cryptography for decentralized certificate authorities, 4) establishing trust through physical/logical domain grouping, and 5) methods for secure message aggregation and using onion signatures. The document aims to provide a comprehensive understanding and comparison of these different secure clustering techniques to help guide further research.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
Survey on Host and Network Based Intrusion Detection System
With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
A novel approach for a secured intrusion detection system in manet
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
Security in manet via different intrusion detection techniques
This document discusses security threats in mobile ad hoc networks (MANETs) and different intrusion detection techniques that can be used to counter attacks. It first describes MANETs and notes their vulnerabilities like dynamic topology, lack of infrastructure, and resource constraints make them prone to security threats. Both passive attacks like eavesdropping and active attacks like black holes, sinkholes, and denial of service attacks are discussed. The document then examines various intrusion detection techniques like specification-based, anomaly-based, agent-based, and cluster-based that could be applied to MANETs to detect security threats and attacks.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
This document discusses the Address Resolution Protocol (ARP) and its use in intrusion detection systems. It proposes a standardized 64-byte ARP protocol structure to more easily capture ARP packets from a network. The structure includes fields for frame information, destination and source addresses, ARP type details, and sender/target MAC and IP addresses. This standardized structure could be integrated into network monitoring to help detect intrusions without affecting normal data transfer processes. Overall, the document aims to optimize the ARP sequence for use in intrusion detection systems.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Intrusion Detection against DDoS Attack in WiMAX Network by Artificial Immune...Editor IJCATR
IEEE 802.16, known as WiMax, is at the top of communication technology because it is gaining a great position in the wireless networks. In this paper, an intrusion detection system for DDOS attacks diagnosis is proposed, inspired by artificial immune system. Since the detection unit on all subscriber stations in the network is WIMAX, proposed system is a fully distributed system. A risk theory is used for antigens detection in attack time. The proposed system decreases the attack effects and increases network performance. Results of simulation show that the proposed system improves negative selection time, detection Precision, and ability to identify new attacks compared to the similar algorithm.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
This document proposes a hybrid intrusion detection system (HIDS) for wireless sensor networks. The HIDS combines cluster-based and rule-based intrusion detection techniques. It is designed to address the limited resources of sensor networks while achieving high detection rates and low false positives. The system works by using cluster heads to detect intrusions based on both anomaly detection and comparing activities to known attack behaviors. A simulation evaluated the HIDS and found it performed intrusion detection efficiently while being energy efficient and having a high detection rate.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes and reviews several techniques for secure clustering in vehicular ad hoc networks (VANETs). It first provides background on VANETs and discusses why secure clustering is important. It then reviews five specific secure clustering techniques that have been proposed: 1) using public key infrastructure for key management between cluster heads, 2) Shamir's secret sharing scheme for data authentication, 3) using threshold cryptography for decentralized certificate authorities, 4) establishing trust through physical/logical domain grouping, and 5) methods for secure message aggregation and using onion signatures. The document aims to provide a comprehensive understanding and comparison of these different secure clustering techniques to help guide further research.
This document presents a novel intrusion detection system called BAACK that is designed specifically for MANETs. BAACK aims to improve security in MANETs by addressing weaknesses in existing IDS approaches. It consists of three parts - ACK, S-ACK and MRA - to detect misbehaving nodes in the presence of receiver collisions, limited transmission power, and false misbehavior reports. All packets are digitally signed for authentication using algorithms like DSA or RSA. The study suggests DSA provides better performance than RSA for MANETs due to its smaller signature size and lower computational requirements.
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for mobile ad hoc networks. It first provides background on AODV and security challenges in mobile ad hoc networks. It then analyzes specific attacks on AODV like traffic redirection, replay attacks, and loop formation. The document presents simulation results for a 5 node network that show that insecure AODV has good throughput but higher packet dropping and delay. It concludes that providing security for AODV is needed to address these issues.
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system or network activities for malicious activities or policy violations. It produces reports to a management station [1]. In this paper we are mainly focused on different IDS concepts based on Host and Network systems.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
Security in manet via different intrusion detection techniquesIAEME Publication
This document discusses security threats in mobile ad hoc networks (MANETs) and different intrusion detection techniques that can be used to counter attacks. It first describes MANETs and notes their vulnerabilities like dynamic topology, lack of infrastructure, and resource constraints make them prone to security threats. Both passive attacks like eavesdropping and active attacks like black holes, sinkholes, and denial of service attacks are discussed. The document then examines various intrusion detection techniques like specification-based, anomaly-based, agent-based, and cluster-based that could be applied to MANETs to detect security threats and attacks.
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
A Mobile ad-hoc network (MANET) is a latest and eme
rging Research topic among researchers. The
reason behind the popularity of MANET is flexibilit
y and independence of network infrastructure. MANET
has some unique characteristic like dynamic network
topology, limited power and limited bandwidth for
communication. MANET has more challenge compare to
any other conventional network. However the
dynamical network topology of MANETs, infrastructur
e-less property and lack of certificate authority m
ake
the security problems of MANETs need to pay more at
tention. This paper represents review of layer wise
security attacks. It also discussed the issues and
challenges of mobile ad hoc network. On the importa
nce of
security issues, this paper proposed intrusion dete
ction framework for detecting network layer threats
such
as black hole attack.
This document discusses the Address Resolution Protocol (ARP) and its use in intrusion detection systems. It proposes a standardized 64-byte ARP protocol structure to more easily capture ARP packets from a network. The structure includes fields for frame information, destination and source addresses, ARP type details, and sender/target MAC and IP addresses. This standardized structure could be integrated into network monitoring to help detect intrusions without affecting normal data transfer processes. Overall, the document aims to optimize the ARP sequence for use in intrusion detection systems.
Similar to TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED INTRUSION DETECTION AND PREVENTION SYSTEM FOR SECURE ROUTING OF MANET
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that evaluates the performance of Byzantine flood rushing attacks in ad hoc networks. The paper implements a flood rushing attack in an AODV-enabled ad hoc network using a network simulator. It analyzes the effects of the attack on network throughput, latency, and packet delivery ratio. The results show that as more adversarial nodes carry out the flood rushing attack, the network throughput decreases and latency increases, degrading network performance.
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
The apt identification and blocking through ids in manetijctet
This document summarizes research on detecting and blocking advanced persistent threats (APTs) in mobile ad hoc networks (MANETs) through an intrusion detection system (IDS). The research proposes applying an IDS to identify and prevent APT attacks from malware like viruses, worms, and trojan horses that could spread in the dynamic MANET topology and degrade network performance. The IDS would monitor nodes, identify suspicious activity based on differences from normal behavior patterns, and block identified attackers to secure the MANET from unauthorized access and data theft or modification by APTs.
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
This document summarizes research on developing a distributed intrusion detection system for mobile ad hoc networks (MANETs) using dynamic neural networks. The system uses learning vector quantization neural networks distributed across nodes to identify patterns of network attacks. In a simulation of 18 nodes, the system successfully detected 80% of man-in-the-middle attacks on the ad hoc on-demand distance vector routing protocol. The distributed nature of the neural network approach helps overcome limitations of bandwidth and connectivity in MANETs compared to traditional centralized intrusion detection systems.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
The document proposes a technique to detect flooding attacks in MANETs using a multi-agent system. It begins by introducing MANETs and some of their vulnerabilities like flooding attacks. It then discusses using a multi-agent approach to both detect flooding attacks and maintain network resilience by identifying malicious nodes and using alternative routes. The paper presents an algorithm to optimally determine the number of agents to launch, detect flooding in message buffers, and avoid attacks by blocking malicious nodes and removing affected routes. Simulation results show the approach improves throughput, packet delivery ratio, and reduces end-to-end delay and packet drops compared to AODV.
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...IJNSA Journal
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
- Wireless sensor networks are vulnerable to security attacks due to their distributed nature, multi-hop communication, and lack of resources. Intrusion detection systems play an important role in detecting attacks.
- There are three main types of intrusion detection systems: signature-based, anomaly-based, and specification-based (a hybrid of the two). Signature-based systems detect known attacks but miss new ones, while anomaly-based systems can detect new attacks but have high false positives.
- The paper compares these intrusion detection systems for wireless sensor networks and finds that anomaly-based systems have the lowest resource usage but may miss known attacks, while signature-based systems detect known attacks but use more resources. The best approach
EMPOWERING MANETS WITH ADVANCED MULTIMODAL BIOMETRIC AUTHENTICATION AND ENCRY...IJNSA Journal
In a mobile ad hoc network (MANET), nodes communicate wirelessly, facing unique challenges. Traditional MANETs suffer from issues like erroneous transmission and vulnerability to unauthorized nodes joining the network, posing security risks. Authentication within MANETs is a significant security concern, prompting ongoing research for enhancements. Our solution integrates multimodal biometric authentication with RSA and AES encryption, providing robust security for user authentication and data protection in MANETs. This approach effectively addresses risks such as unauthorized access and data tampering, crucial for secure communication in dynamic, resource-limited MANET environments. Our proposed system utilizes a combination of face and fingerprint biometrics for encryption, enhancing network security. Through testing, our system demonstrates a high authentication rate of 92.42% with minimal processing times: 0.042 ms for key generation, 0.019 ms for encryption, and 0.032 ms for decryption, based on a 1024-bit key size. These practical results showcase the resilience and efficiency of our secure system.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
This document discusses a modular approach to intrusion detection in homogeneous wireless networks. It begins by introducing wireless networks and the need for intrusion detection systems (IDS) due to security vulnerabilities. It then discusses different types of IDS, including signature-based detection that identifies known attacks, and anomaly-based detection that identifies deviations from normal behavior but can result in high false positives. The document proposes a modular approach combining advantages of signature-based and anomaly-based detection for high detection rates and low false positives. Requirements for IDS in wireless networks are also outlined.
This document summarizes an article from the International Journal of Computer Engineering and Technology about enhancing power-aware hybrid intrusion detection architecture in an ad-hoc network using mobile agents. It discusses designing and implementing an energy-efficient anomaly-based cooperative intrusion detection system that applies mobile agent technology to minimize network load, conserve bandwidth, and improve reactivity. It also aims to minimize energy consumption of monitoring nodes using the Back-Propagation algorithm. The paper then presents a new approach to intrusion detection system architecture in ad-hoc networks using mobile agents to determine which network events need monitoring and where.
An ids scheme against black hole attack to secure aomdv routing in manet pijans
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant
centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind
of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver
data in between source and destination. In this research we work on security field in MANET and proposed
a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand
Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as
compare to single path routing protocol. The attacker is affected all the possible paths that is selected by
sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing
by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS)
scheme is identified the attacker information through hop count mechanism. The routing information of
actual data is reached to which intermediate node and the next hop information is exist at that node is
confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in
future attacker is not participating in routing procedure. The proposed security scheme detects and
provides the deterrence against routing misbehavior through malicious attack. Here we compare the
routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing
and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but
observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme
and recovers 95 % of data as compare to normal routing.
Outstanding to the promotion of the Internet and local networks, interruption occasions to computer
systems are emerging. Intrusion detection systems are becoming progressively vital in retaining
appropriate network safety. IDS is a software or hardware device that deals with attacks by gathering
information from a numerous system and network sources, then evaluating signs of security complexities.
Enterprise networked systems are unsurprisingly unprotected to the growing threats posed by hackers as
well as malicious users inside to a network. IDS technology is one of the significant tools used now-a-days,
to counter such threat. In this research we have proposed framework by using advance feature selection
and dimensionality reduction technique we can reduce IDS data then applying Fuzzy ARTMAP classifier
we can find intrusions so that we get accurate results within less time. Feature selection, as an active
research area in decreasing dimensionality, eliminating unrelated data, developing learning correctness,
and improving result unambiguousness.
Similar to TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED INTRUSION DETECTION AND PREVENTION SYSTEM FOR SECURE ROUTING OF MANET (20)
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
Paper Title
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability
Authors
Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, India
Abstract
Cloud computing is widely used by organizations and individuals due to its flexibility and reliability. The trust model is important for cloud computing to detect malicious users and protect user privacy. The existing research faces the issues of local optima trap and overfitting problems when a training user node is idle for more time. This research proposed Weighted Coefficient Firefly Optimization Algorithm (WCFOA) with Support Vector Machine (SVM) for the trust model calculation and identifying paths with better Quality of Services (QoS). The weighted coefficient is added to the FOA model to balance the exploration and exploitation in the search of identifying optimal path based on reliability score. The WC-FOA method measures the link reliability in the model and SVM detects the malicious users in the model. The WC-FOA model selects the optimal path for transmission in terms of trust and efficient QoS parameters. The entropy measure and link reliability are provided as input to the SVM model for the detection of attacks in the network. The WCFOA-SVM model has 96% malicious user detection, whereas the Random Forest Hierarchical Ant Colony Optimization (RF-HEACO) has 92 % accuracy.
Keywords
Cloud computing, Entropy Measure, Support Vector Machine, Trust model, Weighted Coefficient Firefly Optimization Algorithm.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc08.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc08.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
Paper Title
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Authors
Malek M. Al-Nawashi, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein and Monther H. Al-Bsool, Al-Balqa Applied University, Jordan
Abstract
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Keywords
Cryptography, SHA-1, Message digest, Data integrity, Digital signature, National security agency
Volume URL: https://airccse.org/journal/ijc2024.html
Youtube URL : https://youtu.be/881rIf1aAPE
Abstract URL: https://aircconline.com/abstract/ijcnc/v16n3/16324cnc06.html
Pdf URL: https://aircconline.com/ijcnc/V16N3/16324cnc06.pdf
#highmobility #complexity #radar #networkanomalydetection #6G #OFDM #OTFS #signalmodeling #transmitter #framework #complexityanalysis #scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #networks #networking #journalpaper #submission #journalsubmission
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2023--1.6
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : July 13, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
Paper Title
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures
Authors
Maurizio D’Arienzo1, Manfredi Napolitano1 and Simon Pietro Romano2, 1Dipartimento di Scienze Politiche Universita della Campania ”L.Vanvitelli”, Italy, 2DIETI Universita di Napoli ”Federico II”, Italy
Abstract
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc07.html
Pdf URL:https://aircconline.com/ijcnc/V14N5/14522cnc07.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Paper Title
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Authors
Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco
Abstract
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
Keywords
Network anomaly detection, Mish, CNN-BiGRU, IDS,Hogzilla dataset
Volume URL: https://airccse.org/journal/ijc2024.html
Youtube URL :https://youtu.be/qpPQiGQCN2g
Abstract URL: https://aircconline.com/abstract/ijcnc/v16n3/16324cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V16N3/16324cnc05.pdf
#highmobility #complexity #radar #networkanomalydetection #6G #OFDM #OTFS #signalmodeling #transmitter #framework #complexityanalysis #scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #networks #networking #journalpaper #submission #journalsubmission
International Journal of Computer Networks & Communications (IJCNC) ----- Sco...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : July 06, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Multi-Layer Digital Validation of Candidate Service Appointment with Digital ...IJCNCJournal
Paper Title
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach
Authors
Saikat Bose1, Tripti Arjariya1, Anirban Goswami2, Soumit Chowdhury3, 1Bhabha University, India, 2Techno Main Salt Lake, Sec – V, India, 3Government College of Engineering & Ceramic Technology, India
Abstract
Proposed work promotes a unique data security protocol for validating candidate’s service appointment. Process initiated with concealment of private share within the first segment of each region of the e-letter at commission’s server. This is governed by hash operations determining circular orientation of private share fragments and their hosted matrix intervals. Signed e-letter downloaded at the posted place is validated through same hash operations and public share. Candidate’s on spot taken fingerprint are concealed in two segments for each region of the eletter adopting similar hiding strategies. The copyright signature of posting place is similarly shielded on fourth segment of each region using hash operations. The certified e-letter is thoroughly validated at commission’s server and signatures stored justify authenticity of appointment and proper candidature at the posting place. The superior test results from wider angles establishes the efficacy of the proposed protocol over the existing approaches.
Keywords
Dynamic Authentication, Standard-Deviation Based Encoding, Variable Encoding, Multi-Signature Hiding, Random Signature Dispersing.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL: https://aircconline.com/abstract/ijcnc/v14n5/14522cnc06.html
Pdf URL:https://aircconline.com/ijcnc/V14N5/14522cnc06.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
International Journal of Computer Networks & Communications (IJCNC) - ---- Sc...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : June 30, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
How to Create Sequence Numbers in Odoo 17Celine George
Sequence numbers are mainly used to identify or differentiate each record in a module. Sequences are customizable and can be configured in a specific pattern such as suffix, prefix or a particular numbering scheme. This slide will show how to create sequence numbers in odoo 17.
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesAstro Pathshala
Ardra Nakshatra, the sixth Nakshatra in Vedic astrology, spans from 6°40' to 20° in the Gemini zodiac sign. Governed by Rahu, the north lunar node, Ardra translates to "the moist one" or "the star of sorrow." Symbolized by a teardrop, it represents the transformational power of storms, bringing both destruction and renewal.
About Astro Pathshala
Astro Pathshala is a renowned astrology institute offering comprehensive astrology courses and personalized astrological consultations for over 20 years. Founded by Gurudev Sunil Vashist ji, Astro Pathshala has been a beacon of knowledge and guidance in the field of Vedic astrology. With a team of experienced astrologers, the institute provides in-depth courses that cover various aspects of astrology, including Nakshatras, planetary influences, and remedies. Whether you are a beginner seeking to learn astrology or someone looking for expert astrological advice, Astro Pathshala is dedicated to helping you navigate life's challenges and unlock your full potential through the ancient wisdom of Vedic astrology.
For more information about their courses and consultations, visit Astro Pathshala.
How to Add Colour Kanban Records in Odoo 17 NotebookCeline George
In Odoo 17, you can enhance the visual appearance of your Kanban view by adding color-coded records using the Notebook feature. This allows you to categorize and distinguish between different types of records based on specific criteria. By adding colors, you can quickly identify and prioritize tasks or items, improving organization and efficiency within your workflow.
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Murugan Solaiyappan
Title: Relational Database Management System Concepts(RDBMS)
Description:
Welcome to the comprehensive guide on Relational Database Management System (RDBMS) concepts, tailored for final year B.Sc. Computer Science students affiliated with Alagappa University. This document covers fundamental principles and advanced topics in RDBMS, offering a structured approach to understanding databases in the context of modern computing. PDF content is prepared from the text book Learn Oracle 8I by JOSE A RAMALHO.
Key Topics Covered:
Main Topic : DATA INTEGRITY, CREATING AND MAINTAINING A TABLE AND INDEX
Sub-Topic :
Data Integrity,Types of Integrity, Integrity Constraints, Primary Key, Foreign key, unique key, self referential integrity,
creating and maintain a table, Modifying a table, alter a table, Deleting a table
Create an Index, Alter Index, Drop Index, Function based index, obtaining information about index, Difference between ROWID and ROWNUM
Target Audience:
Final year B.Sc. Computer Science students at Alagappa University seeking a solid foundation in RDBMS principles for academic and practical applications.
About the Author:
Dr. S. Murugan is Associate Professor at Alagappa Government Arts College, Karaikudi. With 23 years of teaching experience in the field of Computer Science, Dr. S. Murugan has a passion for simplifying complex concepts in database management.
Disclaimer:
This document is intended for educational purposes only. The content presented here reflects the author’s understanding in the field of RDBMS as of 2024.
Feedback and Contact Information:
Your feedback is valuable! For any queries or suggestions, please contact muruganjit@agacollege.in
(T.L.E.) Agriculture: Essentials of GardeningMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏.𝟎)-𝐅𝐢𝐧𝐚𝐥𝐬
Lesson Outcome:
-Students will understand the basics of gardening, including the importance of soil, water, and sunlight for plant growth. They will learn to identify and use essential gardening tools, plant seeds, and seedlings properly, and manage common garden pests using eco-friendly methods.
Split Shifts From Gantt View in the Odoo 17Celine George
Odoo allows users to split long shifts into multiple segments directly from the Gantt view.Each segment retains details of the original shift, such as employee assignment, start time, end time, and specific tasks or descriptions.
The membership Module in the Odoo 17 ERPCeline George
Some business organizations give membership to their customers to ensure the long term relationship with those customers. If the customer is a member of the business then they get special offers and other benefits. The membership module in odoo 17 is helpful to manage everything related to the membership of multiple customers.
Delegation Inheritance in Odoo 17 and Its Use CasesCeline George
There are 3 types of inheritance in odoo Classical, Extension, and Delegation. Delegation inheritance is used to sink other models to our custom model. And there is no change in the views. This slide will discuss delegation inheritance and its use cases in odoo 17.
Is Email Marketing Really Effective In 2024?Rakesh Jalan
Slide 1
Is Email Marketing Really Effective in 2024?
Yes, Email Marketing is still a great method for direct marketing.
Slide 2
In this article we will cover:
- What is Email Marketing?
- Pros and cons of Email Marketing.
- Tools available for Email Marketing.
- Ways to make Email Marketing effective.
Slide 3
What Is Email Marketing?
Using email to contact customers is called Email Marketing. It's a quiet and effective communication method. Mastering it can significantly boost business. In digital marketing, two long-term assets are your website and your email list. Social media apps may change, but your website and email list remain constant.
Slide 4
Types of Email Marketing:
1. Welcome Emails
2. Information Emails
3. Transactional Emails
4. Newsletter Emails
5. Lead Nurturing Emails
6. Sponsorship Emails
7. Sales Letter Emails
8. Re-Engagement Emails
9. Brand Story Emails
10. Review Request Emails
Slide 5
Advantages Of Email Marketing
1. Cost-Effective: Cheaper than other methods.
2. Easy: Simple to learn and use.
3. Targeted Audience: Reach your exact audience.
4. Detailed Messages: Convey clear, detailed messages.
5. Non-Disturbing: Less intrusive than social media.
6. Non-Irritating: Customers are less likely to get annoyed.
7. Long Format: Use detailed text, photos, and videos.
8. Easy to Unsubscribe: Customers can easily opt out.
9. Easy Tracking: Track delivery, open rates, and clicks.
10. Professional: Seen as more professional; customers read carefully.
Slide 6
Disadvantages Of Email Marketing:
1. Irrelevant Emails: Costs can rise with irrelevant emails.
2. Poor Content: Boring emails can lead to disengagement.
3. Easy Unsubscribe: Customers can easily leave your list.
Slide 7
Email Marketing Tools
Choosing a good tool involves considering:
1. Deliverability: Email delivery rate.
2. Inbox Placement: Reaching inbox, not spam or promotions.
3. Ease of Use: Simplicity of use.
4. Cost: Affordability.
5. List Maintenance: Keeping the list clean.
6. Features: Regular features like Broadcast and Sequence.
7. Automation: Better with automation.
Slide 8
Top 5 Email Marketing Tools:
1. ConvertKit
2. Get Response
3. Mailchimp
4. Active Campaign
5. Aweber
Slide 9
Email Marketing Strategy
To get good results, consider:
1. Build your own list.
2. Never buy leads.
3. Respect your customers.
4. Always provide value.
5. Don’t email just to sell.
6. Write heartfelt emails.
7. Stick to a schedule.
8. Use photos and videos.
9. Segment your list.
10. Personalize emails.
11. Ensure mobile-friendliness.
12. Optimize timing.
13. Keep designs clean.
14. Remove cold leads.
Slide 10
Uses of Email Marketing:
1. Affiliate Marketing
2. Blogging
3. Customer Relationship Management (CRM)
4. Newsletter Circulation
5. Transaction Notifications
6. Information Dissemination
7. Gathering Feedback
8. Selling Courses
9. Selling Products/Services
Read Full Article:
https://digitalsamaaj.com/is-email-marketing-effective-in-2024/
How to Show Sample Data in Tree and Kanban View in Odoo 17Celine George
In Odoo 17, sample data serves as a valuable resource for users seeking to familiarize themselves with the functionalities and capabilities of the software prior to integrating their own information. In this slide we are going to discuss about how to show sample data to a tree view and a kanban view.
How to Show Sample Data in Tree and Kanban View in Odoo 17
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED INTRUSION DETECTION AND PREVENTION SYSTEM FOR SECURE ROUTING OF MANET
1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
DOI: 10.5121/ijcnc.2018.10102 13
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED
PARTICLE SWARM OPTIMIZATION BASED
INTRUSION DETECTION AND PREVENTION
SYSTEM FOR SECURE ROUTING OF MANET
Ramireddy Kondaiah1
and Bachala Sathyanarayana2
1
Research Scholar, Department of Computer Science, Rayalaseema University, Kurnool
,A.P,India.& Associate Professor, Dept of CSE, PBRVITS, Kavali, Andhra Pradesh ,
India.
2
Professor in Computer Science &Technology ,Sri Krishnadevaraya University,
Anantapur, A.P, India.
ABSTRACT
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained
attention in a wide range of applications in the fields of military, private sectors, commercials and natural
calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based
intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of
the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured.
Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (Fuzzy-
FPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization
(PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed
methodology is NS2 simulator and analysis is carried out considering four cases, like without attack,
flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and
detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal
throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing
overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal
throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing
overhead of 0.11511.
KEYWORDS
MANET, Routing, Trust, Fuzzy system, Firefly Algorithm, Particle Swarm Optimization.
1. INTRODUCTION
The wireless communication network is available in many modes with the hasty technology
evolution. Because of the omnipresent existence of remarkable factors, like scalability and
mobility, the wireless networks [1] are preferred compared to the wired network. One of the
crucial applications of the wireless network is the Mobile Ad-hoc Network (MANET), which has
uninterrupted self-configuration, self-maintenance and framework-less network for mobile
gadgets interlinked without wires [2]. A MANET is a collection of heterogeneous, self-organized
and battery powered mobile nodes with varying availability of resources and computation
capacity [5]. The communication of data between these nodes is established with the help of
neighbors either directly or indirectly without utilizing the support of any central coordinator or
permanent framework [6]. MANET is extensively used when the components or mobile nodes are
not within the similar transmission range. Single-hop network and multi-hop network are the two
types of networks; A network which provides direct communication between nodes existing
within the same range is named single-hop network. It doesn’t require any intermediate node,
2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
14
whereas the multi-hop network provides indirect communication between the nodes by
employing intermediate nodes. Owing to the non-availability of the central point of control, it
expands to the incorporation of a malicious node into the network leading to various attacks [11]
[4]. The enforcing procedure is tough because of the lack of infrastructure; such rare traits make
the utilization of MANET in several fields [2]. The vigorous and distributed attribute of MANET
makes them applicable in various applications, like monitoring of the environment, reclamation
activity at emergencies, military processes, and human-urged hazards [5].
Network security is also a dominant application of MANET since it is an open medium, which is
highly vulnerable to malicious attack by several attackers. Such malicious attacks in the MANET
[12] are mainly due to the poor physical security measures. Since the MANET is tremendously
vulnerable to easy interpolation of non-cooperative nodes and malicious nodes by attackers, a
routing table is perpetuated in the network. Because of the distributed architecture in MANET
with none of the controlling equipment, like access points or routers, it is troublesome to
centralize the monitoring process [2]. The MANET has various routing protocols for providing
assurance about the network cooperation, non-availability of the malicious node and routing the
packets from source to destination [3]. The recent routing algorithms [25] are not constructed to
overcome the malicious attacks, whereas the newly designed routing protocols are readily
susceptible to react to the security hazards in the MANET [3]. Even though the networking
technology has evolved to a greater extent in the last decade from fixed to wireless
communication, the Intrusion Detection and Prevention (IDP) is still confessed as the primitive
layer of defense. But in MANET, the IDP is declared as the elemental layer of defense since the
implementation of the firewall is complicated [14] [9].
The malfunctionality of network gadgets, congestion in the network, active attack and intrusions
are the major causes of the abnormality in MANET. An acute aberration, which spoils the
availability and service integrity of a network, is the Intrusion [8]. Since the standard security
measures like authentication and security don't assure complete network protection, the IDP
mechanisms are extensively employed to protect the MANETs [9]. This IDP secures the nodes in
the network from routing attacks. The two major Intrusion Detection (ID) schemes are
Knowledge-Based Intrusion Detection (KBID) and Anomaly-Based Intrusion Detection (ABID).
The KBID predicts only the attacks, whose signatures are already in the database. It has probably
low false detection rate, whereas ABID exploits even the fresh and abrupt attacks, providing
warning alarms for other expected intrusions. But KBID is highly prone to produce false positives
compared to ABID [15]. Intrusion Detection Systems (IDSs) are employed to inspect the
movements and destructive offensive actions within the network [14]. IDSs [26] investigate the
unapproved operation of system and aggression in the network architecture. The IDS
consideration is important because of the technology advancement and high chances of threats on
the internet [13] [10]. Intrusion Prevention Systems (IPSs) are usually used to identify and protect
the network from abominable traffic and the malicious attack consequences. Hence, an Intelligent
Intrusion Detection and Prevention System (IIDPS) with the cooperation of trust management and
a detection algorithm for the attack is proposed for identifying the malicious node [10].
This research intends to design an IDPS with the assistance of trust management and attacker’s
detection algorithm. The major goal of this proposed IDPS system is to provide the nodes with
the secured path rather than the shortest path. This scheme explores all the feasible paths from the
source node to a destination node on the basis of their trust modeled based on four trust factors,
such as direct, indirect, recent and historic trust. From these feasible paths, the best optimal path
is selected by the utilization of the newly devised FPSO algorithm, constructed by the
incorporation of the FA and PSO optimization algorithms. The optimized path with the maximum
trust is conferred as the best secure path for routing. It also discovers and protects the nodes from
malicious attacks by enhancing the detection rate, throughput, and delay.The major contribution
3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
15
of this research is developing a trust-based optimization algorithm, FPSO, by the integration of
FA and PSO for the optimal path selection and thereby, combining the algorithm with the fuzzy
logic, to develop fuzzy-FPSO, for the secured data communication in MANET.
The Organization of the rest of the paper is : the literature survey is discussed in Section 2, here
the related works of IDSs are reviewed, the sytem setup together with the trust model are
explained in section 3, the proposed IDPS scheme for protecting nodes from attacks and
providing a secured routing path is elaborated in Section 4, the simulation results of the proposed
work is available in Section 5 and finally, the conclusion of the research is made in Section 6.
2. MOTIVATION
2.1 RELATED WORKS
This section elaborates the algorithms and techniques used in the priorly existing systems for the
IDP in MANETs to gather some knowledge for the proposed IIDPS implementation Opinder
Singh et al. [10] proposed an Intelligent IDPS (IIDPS), for protecting the ad-hoc network from
malicious attacks. It was comprised of a central network administrator for malicious node
detection and a trust manager to classify the network trust into various categories. This
methodology enhances the performance of networks in MANET, but it is not convenient for
detecting several types of attack in data mining.
Rajesh Babu and Usha [2] presented a Novel Honeypot Based Detection and Isolation Approach
(NHBADI) that supported in detection and isolation of black hole attacks in MANET. Along with
the detection of the malicious nodes, the approach had isolated the black hole prone nodes in the
network. It improved the network security by minimizing the packet drop ratio, network overhead
and normalized routing load. One of the considerable drawbacks is it doesn't track or solve the
intruder activity of indirect interaction.
Poonam Joshi et al. [3] developed an Enhanced Adaptive ACKnowledgment (EAACK) technique
for detection of malicious behavior. It is a powerful attack controlling mechanism guaranteeing
data security, but it cannot handle the attacks like black hole attack or even spoofing.
Farrukh Aslam Khan et al. [4] presented a Detection and Prevention System (DPS) technique to
identify and thwart the malicious nodes in MANETs. For continuous monitoring of the nodal
behavior some special nodes, named DPS nodes, were employed. When the DPS node had
predicted some abnormal nodal behavior, the technique could assign that node as a wormhole,
broadcasting the message to the other nodes to terminate the control and data messages to the
particular node. The main advantage was it minimized the total number of dropped packets due to
the malicious nodes with a minimum false positive rate. However, the technique is not suitable to
modify the DPS system to prevent the network from other similar attacks.
Basant Subba et al. [5] developed a Bayesian game theory based MANET IDS scheme to address
the rapid depletion of battery life of node. The scheme comprised of an election process based on
cluster leader and hybrid IDS. The election process with respect to cluster leader had elected the
cluster leader for intrusion detection service by utilizing Vickrey–Clarke–Groves scheme. The
hybrid IDS consisted of a lightweight module based on a threshold and a heavyweight module
based on the powerful anomaly. The scheme reduces the power consumption along with the
achievement of maximum detection rate and minimum false alarm rate but doesn't target on
minimizing false positive rate and enhancing the detection rate of hybrid MANET IDS
heavyweight and lightweight modules.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
16
Marchang et al. [6] presented a Probabilistic model, which utilized the cooperation among the
neighboring node IDSs for reducing the individual active time. The model aimed to decrease the
active time duration of IDSs without affecting its effectiveness. The interactions between the
IDSs were modeled as a multi-player cooperative game, which provided partially conflicting and
partially cooperative goals, for the validation purpose. The model enhances the network lifetime
significantly but is not suitable for heterogeneous networks.
G. Usha et al. [7] proposed a Honeypot Based Dynamic Anomaly Detection Using Cross-Layer
Security (HBDADCS), for prediction and protection of the MANET from black hole attack. This
technique enhanced the detection accuracy of attacks and provided better delivery of packets.
However, due to the least percentage of black hole nodes, the network load is very low.
Erfan A Shams, and Ahmet Rizaner [8] developed a SVM-based IDS to predict the Denial of
Service (DoS) type of attacks. The system had provided continuous monitoring of the network to
predict and eliminate the malicious nodes in the MANET, in order to enhance its performance. It
had intensified the network reliability and was independent of the network size, node mobility
and network routing protocol. The system could detect and remove the network attacks within a
short computing time, and high detection rate, but the packet delivery ratio shrinks when a
malicious node is available in the system.
2.2 CHALLENGES
Some of the perceived challenges from the above literature survey are stated as follows,
• The traditional routing protocols can’t effectively predict and protect the MANET from
various intruder attacks. One of the highly demanded aspects in MANET design is the
evolution of a secure routing protocol [4].
• The Bayesian game theory based MANET IDS scheme [5] doesn’t address several issues,
like the prediction of selfish nodes in MANETs with high accuracy, reducing the
computational overhead associated with the mechanism of cluster leader node selection.
• On implementation of SVM-based IDS [8], the packet delivery ratio decreases due to the
availability of malicious nodes in the system. The end-to-end delay is maximum when
malicious nodes attack the network. When the network is affected by a large number of
malicious nodes, the effect becomes worse.
3. NETWORK MODEL OF MANET
A MANET is a self-configured collection of wireless devices or nodes, which easily transmit and
receive data with the support of MANET. The type of application decides the node density and
the number of nodes for data transmission. Figure 1 displays the network model of a MANET
with a number of nodes, expressed as { }qv AAAA ,,,,1 LL= , where q is the total number of
nodes in the MANET. Each node is located in the network at the location ),( ba , such that the
location of th
v the node is ),( vv ba . The source node is denoted as SA and the destination node is
denoted as DA . The data transmission within the network is done hop by hop because of the
limited transmission range [17]. All the nodes that constitute a path are assumed to be within a
transmission range, denoted as R . The routing between the source and the destination is carried
out on the basis of trust computation value through trusted nodes. Here the nodes with maximum
trust value are considered as secured nodes, whereas the nodes with minimum trust value are
considered as intruder nodes. The sink used in the MANET, denoted as J acts as a server and
manages the traffic and improves the lifetime of the network. There are multiple routes available
between the source and destination and the optimal path for transmission is selected by
employing FPSO algorithm.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
17
Figure 1. Network Model of MANET
3.1 TRUST COMPUTATION MODEL
Trust computation plays an important role in exploiting the trust of agents in the existence of
malicious nodes in a network. The main function of the trust model [18] is to gather, disseminate
and accumulate the feedback of previous participant nodes. The trust is the relationship between
two nodes in a network; trust computation classifies the nodes as trusted and non-trusted nodes.
The trust computation value is quantified within the limit 1 to -1, where -1 indicates the non-
trusted nodes, +1 indicates the trusted nodes, and 0 indicates the unknown nodes. The four trust
computations chosen for predicting the trusted source and destination nodes are direct, indirect,
recent and historic.
Direct trust: The direct trust is also called local trust; it indicates the trust portion, which a node
calculates from its self-experience about the target nodes.
)(
)(
)( ,
,
,
tN
tN
tT wv
S
wv
Rdirect
wv = (1)
Where, )(, tT direct
wv indicates the direct trust at an instant t , )(,
tN wv
R denotes the total number of
packets received by vA from wA within the time t , i.e., from 1 to t , and )(,
tN wv
S indicates the
total number of packets sent by vA to wA within the timet .
Indirect trust: The indirect trust is also called as recommendation, and is calculated from the
experience of neighbouring nodes about the target node.
)(
1
)(
1
,, tT
n
tT
n
g
direct
wg
indirect
wv ∑=
= (2)
Where, )(, tT indirect
wv indicates the indirect trust at instantt , n denotes the number of neighbouring
nodes of the th
w node, where wis the target node whose trust is to be computed, and )(, tT direct
wg
6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
18
denotes the direct trust value between the target node w and neighbouring node g , g value
varies from ng ≤≤1 .
Recent trust: The recent trust is the integration of direct and indirect trust; it considers the recent
behaviours of the target node.
)()1()()( ,,, tTtTtT indirect
wv
direct
wv
recent
wv ∗−+∗= ββ (3)
Where, )(, tT recent
wv denotes the recent trust at instantt , and β represents the direct trust weight,
which has the value given by 5.0=β
Historical trust: The historical trust is calculated by considering the past experiences and long-
term behavioural pattern of the target node.
)1()1()( ,,, −+−∗= tTtTtT recent
wv
historic
wv
historic
wv ρ (4)
where, )(, tT historic
wv notifies the historic trust at instant t , ρ is the forgetting factor whose limit is
given by 10 ≤≤ ρ , the historic trust at th
t )1( − instant is denoted as )1(, −tT historic
wv , and the
recent trust at th
t )1( − instant is indicated as )1(, −tT recent
wv .
4. PROPOSED IDPS BASED ON THE TRUST FACTOR AND THE FIREFLY
INTEGRATED PARTICLE SWARM OPTIMIZATION ALGORITHM
The Intrusion Detection and Prevention in MANET utilizing the proposed fuzzy-FPSO is
discussed in this section. The primitive goal of this work is to construct a contemporary highly
secure routing protocol by implementing trust factor and fuzzy based IDPS methodology. For the
Intrusion Detection and Prevention, here a trust factor and Firefly integrated Particle Swarm
Optimization (FPSO) algorithms are employed for predicting the secure route in the MANET.
The four major phases of this research are i) Trust computation of the nodes, ii) Intrusion
detection using fuzzy rule classifier, iii) Path generation, and iv) Selection of the secured path
using the proposed FPSO Algorithm. In phase 1, the trust value of every node will be calculated
on the basis of various trust factors, like direct trust, indirect trust, recent trust and historic trust.
After the successful computation of trust value of nodes, the intrusion detection will be identified
on the basis of Fuzzy rule classifier. The attackers intruding the network can be predicted by
employing the proposed IDPS with fuzzy rule along with trust factors. Once the secure nodes are
identified, the newly designed FPSO algorithm plays the vital role in the optimal path selection
for secure routing.
The block diagram of the IDPS implementation using proposed fuzzy-FPSO is depicted in figure
2. The four main steps in the IDPS are intrusion detection, path prediction, optimal path selection,
and finally the data transmission. Initially, all the nodes are initialized with trust=1, the intrusion
node is detected by utilizing the fuzzy classifier. On the basis of the trust, the source node and the
destination node are chosen for the transmission of data. All the paths between the source-
destination nodes are predicted considering the trust level of the nodes. For determining the
optimal path between source and destination, an integrated newly designed FPSO optimization
algorithm is employed that predicts the path concerning the appropriate fitness function. Then,
the data will be sent through the predicted optimal path. The upcoming sections elaborate the
proposed methodology.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
19
Figure 2. Block diagram of IDPS implementation using proposed fuzzy-FPSO
4.1 FUZZY BASED INTRUSION DETECTION IN MANET
The similarity between the MANET and the fuzzy system is that both deals with uncertainty. The
uncertain mobility of nodes makes the communication in MANET vulnerable. The fuzzy system
is adaptable, and it can modify its fuzzy rule set and membership functions, its block diagram is
depicted in figure 3. The mathematical pattern representation of the fuzzy set is called as the
mathematical function. This fuzzy system [19] is employed to predict the intrusion nodes in a
data communication system on the basis of trust computation values. The four main modules [20]
for the intrusion detection system using the fuzzy system are i) extraction of trust based parameter
module, ii) Inference module of fuzzy, iii) Threshold-based decision module, and iv) Response
module. Initially, the extracted trust based parameters are fed to the fuzzy system as the input.
The fuzzification is the process of conversion of the input or output value to their semantic level
in order to determine its membership function. The relationship between the input and output
value is supervised by a set of rules. After the generation of all the rules the resultant control
surface is denoted as the constraint output, this mechanism is termed as inference. The process of
conversion of fuzzy data into crisp data is said to be defuzzification. In the inference module, the
membership functions and the fuzzy rules are applied on the input trust parameters to determine
the level of fidelity in each node. In the threshold based decision module, the fidelity level of
nodes is compared with the threshold value to predict the behavior of the node. The response
module is initiated concluding that, if the fidelity level of a node is greater than the threshold, it is
a secured node, whereas if the fidelity level is lesser than the threshold, it is an intruder node.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
20
Figure 3. Block Diagram of the Fuzzy System
4.2 PATH GENERATION BETWEEN SOURCE AND DESTINATION
After the prediction of the secured nodes and intruder nodes using the fuzzy system, the next step
is the generation of paths between the source and the destination through the trusted nodes. Thus,
all the possible number of paths between the source node, SA , and the destination node, DA , are
generated for the transmission of packets. Some of the possible paths from the source to the
destination in figure 1 can be interpreted as S → 8 → 9 → D, S → 10 → D, S → 2 → 3→ 4→ D,
and so on. From the generated paths, the optimal ‘p’ paths are to be selected by implementing the
newly developed FPSO optimization algorithm, based on the objective function, which will be
discussed in section 4.3.
4.3 PROPOSED FPSO FOR THE SELECTION OF OPTIMAL PATH
The important research field, which is based on the collective behaviour of decentralized and self-
organized systems, is the Swarm Intelligence (SI). The Firefly Algorithm (FA) is incorporated
with the PSO for the optimal path selection. FA [21] [22] is a recently evolved SI, which is a type
of nature-inspired, stochastic, meta-heuristic algorithm employed to deal with the hard
optimization issues. FA was promoted by the inspiration of firefly’s flashing light and was
incorporated for determining the optimal path by trial and error method. Initially, it produces new
solutions within the search space and then chooses the optimal path for efficient data
transmission. Every search process is inveigled by the balance between exploration and
exploitation, exploration focuses on the methodologies for the generation of varying solutions
within the search space and exploitation denotes the search process within the proximity of
optimal solution. The main advantages of FA are it posses multi-nodal characteristics and so, it
can easily solve the multi-nodal issues, providing faster convergence. Moreover, it can solve both
local and global problems. Particle Swarm Optimization (PSO) algorithm [16], [23] is also a
stochastic Optimization algorithm based on SI, imitating the social behaviour of animals, like
herd, birds, fishes and insects. Each particle is defined as the promising solution for the search
space's optimal problems by memorizing the position and velocity of the swarm. For every
generation, the information of particles is merged together for altering the dimension's velocity,
which is used for computing the new particle position. In the search space of multi-dimension,
there is a constant alteration in the particle state, until the optimum or balanced state is reached.
The fitness functions are utilized for creating an exclusive connection between the varying
dimensions in the problem space. The major advantages of PSO are faster convergence, simple
9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
21
and easy, robust, applicable to the varying environment with minimal modifications and provide
better performance on hybridization with other algorithms. The above-discussed FA is
incorporated with the PSO in order to select the optimal p-paths from the generated paths. The
optimal path is selected for the data transmission to provide effective communication by
minimizing the intrusion.
4.3.1 SOLUTION ENCODING
The simplest representation of the algorithm’s procedure is given by the solution encoding. The
encoding method for prediction of the optimal path by the proposed FPSO is mentioned here.
From the generated paths, the optimal path via non-intruded nodes is chosen by using the
proposed FPSO algorithm. Let ‘ P ’ be the number of paths generated between the source and the
destination. Let the population representing P number of solutions or the solution set be
},,2,1{ PG L= . By utilizing the fitness function the binary valued solution is obtained. For the
secure transmission of packets during routing, the fitness function is developed by considering the
distance and trust, as its main objective functions. From the generated P solutions, the proposed
FPSO chooses the maximum fitness valued solution, i.e. ‘p’ paths, for the optimal path selection.
4.3.2 FITNESS FORMULATION
The fitness function included in the optimization scheme makes the decisions based on the
solution quality. The major aim of the fitness function of FPSO with distance and trust as its
objective is to maximize the fitness value. The distance between the nodes taking part in routing
must be in minimum for an efficient route. Trust level is computed between the node and its
neighboring nodes for ensuring security in the network. The nodes with the maximum trust level
will be only chosen as the intermediate trusted nodes for data transmission. The maximum fitness
valued solution is considered as the optimal path of a system. The formulation of fitness function
is given below,
[ ]( )∑=
−+=
P
k
k
path
k
path DT
P
Fitness
1
15.0
1
(5)
where, Pdenotes the considered number of multipaths, k
pathT indicates the Path trust of the th
k
path, k
pathD represents the Path distance of the th
k path. The pathT value must be maximum in
an effective system; it is computed based on the trust of the nodes in the particular path by using
the below equation (6).
∑ ∑
−
= +=
=
1
1 1
,2
1 m
c
m
cd
dc
k
path T
m
T
(6)
where, m denotes the total number of nodes in the particular path, and dcT , indicates the trust
value between th
c node and th
d node in the path k .
The computed path distance value k
pathD must be in minimum for effective intrusion detection.
dcT , and k
pathD is calculated by using the following equations (7) and (8),
[ ]historicrecentindirectdirect
dc TTTTT +++∗=
4
1
,
(7)
∑ ∑
−
= +=
=
1
1 1
,2
1 m
c
m
cd
dc
k
path D
m
D (8)
10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
22
Where, the distance between the th
c node and th
d node is denoted as dcD , , and it is formulated
as shown in equation (9),
SA
dcED
D dc
),(
, = (9)
where, ),( dcED denotes the Euclidian distance between th
c node and th
d node and SA is the
Simulation Area of dimension 100100× .
4.3.3 FPSO ALGORITHM
The proposed FPSO was constructed by incorporating FA [21] and PSO [23] algorithm, for the
detection and prevention of malicious nodes in MANET, assuring secured data communication.
The steps associated with the FPSO algorithm are discussed below,
Step I: Initialization
Initialization of the swarm population is the basic step of the algorithm. The population for the
proposed FPSO is expressed as
{ } LiHHHHH Li ≤≤= 1;,,,,, 21 KK (10)
Where, Lis represented as the population size, and iH is the th
i solution of the population.
STEP II: FITNESS COMPUTATION
The fitness value for each solution is computed using the equation (5), the maximum fitness
valued solution is considered as the optimal path for data communication. The node’s positions
are updated based on the iterative generation of fitness value of the solutions. The optimal path
prediction and reallocation of node’s location is discussed in the remaining steps.
STEP III: UPDATING POSITION WITH THE INTEGRATED FA
The PSO algorithm was evolved by imitating the animal social behavior of leaderless swarm or
group. The best surveillance condition for the animal is achieved by simultaneous communication
with the other members already surviving in better circumstances. Finally, the best condition
(optimal solution) is achieved by continuous exchange of information between its members [24].
Here every node is considered as a member and the distance and trust level are the information
parameters. This PSO is accelerated to provide better results and solves problems of varying
diversity when some modifications are included. In this research, the provided modification for
PSO is the integration of PSO with FA.
Let the particle position be )(zHi at time instant z , the position of the particle is updated by
adding velocity since the velocity influences the particle position,
)1()()1( ++=+ zUzHzH iii (11)
where, )1( +zHi is represented as the particle position at th
z 1+ instant and )1( +zUi is
denoted as the particle velocity at th
z 1+ instant and its formula is given by,
))()(())()(()()1( 2211 zHzBshzHzBshzFuzU igilii −+−+=+ (12)
11. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
23
where, )(zui is indicated as the velocity at th
z instant , F is mentioned as the weight whose value
ranges from 0 to 1, the acceleration coefficients are denoted as 1h and 2h , the random vectors are
indicated as 1s and 2s , the local best solution is denoted as )(zBl , and the global best solution is
denoted as )(zBg .
The formulation of position update equation of PSO is shown in the upcoming equations (13),
(14) and (15) as follows,
))()(())()(()()()1( 2211 zHzBshzHzBshzFuzHzH igiliii −+−++=+
(13)
)()()()()()()1( 22112211 zBshzBshzFuzHshzHshzHzH gliiiii +++−−=+
(14)
[ ] )()()(1)()1( 22112211 zBshzBshzFushshzHzH gliii +++−−=+ (15)
In the proposed FPSO, FA is employed to improve the performance of PSO for the optimal path
selection. Using FA [21], the firefly population is randomly initiated, and the initial parameter
value is altered by the inclusion of alpha new function. Based on the fitness value, the best
population (optimal solution) is identified, and finally the reallocation of the position of fireflies
is done.
iij
r
ii zHzHezHzH ∈+−+=+ −
αβ γ
))()(()()1(
2
0 (16)
where, )1( +zHi is the firefly position at th
z 1+ instant, )(zHi is the firefly position at th
z
instant, j and iare the fireflies considered for position update, 0β is indicated as the
attractiveness at 0=r , γ is mentioned as the fixed light absorption coefficient, r is represented
as the distance between the two fireflies j and i, α is indicated as the randomization parameter
within the limit [ ]0,1 and i∈ is denoted as the random number drawn from Gaussian distribution.
ii
r
j
r
ii zHezHezHzH ∈+−+=+
−−
αββ
γγ
)()()()1(
22
00
(17)
[ ] ij
rr
ii zHeezHzH ∈++−=+
−−
αββ
γγ
)(1)()1(
22
00
(18)
[ ]ij
r
iri zHezH
e
zH ∈−−+
−
=
−
−
αβ
β
γ
γ
)()1(
1
1
)(
2
2 0
0 (19)
The formulation of position update of FPSO is explained in the upcoming equations by
substituting equation (19) in equation (15),
[ ][ ]
)()()(
1)()1(
1
1
)1(
2211
22110
0
2
2
zBshzBshzFu
shshzHezH
e
zH
gli
ij
r
iri
++
+−−
∈−−+
−
=+
−
−
αβ
β
γ
γ
(20)
[ ][ ]
)()()(
1)(
1
1
1
)1(
)1(
2211
22110
00
2
22
zBshzBshzFu
shshzHe
ee
zH
zH
gli
ij
r
rr
i
i
++
+−−
∈−
−
−
−
+
=+
−
−−
αβ
ββ
γ
γγ
(21)
12. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
24
[ ] [ ]
)()()(
1))((
1
1
1
1
)1(
)1(
2211
22110
0
2211
0
2
22
zBshzBshzFu
shshzHe
e
shsh
e
zH
zH
gli
ij
r
rr
i
i
++
+−−
∈+
−
−−−
−
+
=+ −
−−
αβ
ββ
γ
γγ
(22)
[ ]
)()()(
1))((
1
1
1
1
1)1(
2211
22110
00
2211
2
22
zBshzBshzFu
shshzHe
ee
shsh
zH
gli
ij
r
rri
++
+−−
∈+
−
−=
−
−−
−+ −
−−
αβ
ββ
γ
γγ
( 23)
[ ]
)()()(
1))((
1
1
1
)1(1
)1(
2211
22110
00
22110 2
22
2
zBshzBshzFu
shshzHe
ee
shshe
zH
gli
ij
r
rr
r
i
++
+−−
∈+
−
−=
−
−−−−
+ −
−−
−
αβ
ββ
β γ
γγ
γ
(24)
[ ]
−−
∈+
−
−++
−−−−
−
=+
−
−
−
−
2211
0
0
2211
22110
0
1
))((
1
1
)()()(
)1(1
1
)1(
2
2
2
2
shsh
zHe
e
zBshzBshzFu
shshe
e
zH
ij
r
rgli
r
r
i
αβ
β
β
β
γ
γ
γ
γ
(25)
Equation (25) is the finally obtained position update equation by using the proposed FPSO
algorithm. Using the above equations the optimal ‘p’ path prediction and the reallocation of nodes
in the MANET is done successfully, for routing.
STEP IV: DETERMINATION OF BEST SOLUTION
After the position update of the nodes using equation (25), the fitness value is computed utilizing
the fitness function in equation (5). The solution with the maximum fitness value is considered as
the best solution.
STEP V: TERMINATION
For the maximum number of iterations, the above steps are iteratively repeated. Finally, the
proposed Fuzzy-FPSO optimization algorithm determines the optimal path for secured data
transmission within the MANET. The pseudo code for the proposed Fuzzy-FPSO is given below
in figure 4.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
25
Figure 4. Pseudo code of the Proposed Fuzzy-FPSO Algorithm
5. RESULTS AND DISCUSSIONS
The results of the proposed Fuzzy-FPSO for optimal path selection in MANET for IDPs are
elaborated in this section. The upcoming sections discuss the experimental setup and the
simulation along with its performance analysis.
5.1 EXPERIMENTAL SETUP
The experimentation is done in a computer configured with OS-Ubuntu-16.04, processor- Intel
core i-3, CPU with network adapter frequency as 2.16 GHz and RAM of 2 GB. NS2 Simulator is
the software tool utilized for the IDPS of MANET utilizing the proposed Fuzzy-FPSO with
various parameters shown in Table 1.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
26
Table 1.Simulation Parameters
5.2 METHODS CHOSEN FOR COMPARISON ANALYSIS
The performance analysis of the proposed Fuzzy-FPSO is compared with the other three existing
schemes like, Hybrid Intrusion Detection System (HIDS) [5], Support Vector Machine Intrusion
Detection System (SVM-IDS) [8] and Intelligent Intrusion Detection and Prevention System
(IIDPS) [10]. IIDPS includes a trust manager and attacker detection algorithm for categorizing
the network's trust and detect the malicious node. The HIDS includes a threshold based
lightweight module and anomaly-based heavyweight module for reducing the IDS traffic and
overall power consumption. Meanwhile, the SVM-IDS use a simple structure for detecting the
DoS attacks within a short time. The effectiveness of the proposed scheme can be determined by
the comparative analysis with the existing approaches.
5.3 EVALUATION MEASURES
The three evaluation metrics considered for the comparative performance analysis are throughput,
delay and detection rate, which are defined below,
Throughput: This is a measure used for acknowledging the data packet delivery between the
source and the destination in the network. It is expressed as the ratio of the delivered number of
data packets to the simulation time.
s
d
T
N
Throughput = (26)
where, the total number of packets delivered is denoted as dN and the Simulation time is
indicated as sT .
Delay: The network’s transmission delay is defined as the ratio of the sum of delays in every
node to the total number of available nodes. It is expressed as shown in equation (27),
( )
q
TT
Delay
rt
∑ −
= (27)
where, the time taken for transmitting the packets is indicated as t
T , the time taken for receiving
packets is denoted r
T and the total number of available nodes is denoted as q .
15. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
27
Detection rate: The ratio of the exactly detected number of malicious nodes to the total number
of available nodes in the network is called as the detection rate.
n
N
RateDetection
q
= (28)
where, the total number of exactly detected malicious nodes is indicated as qN .
5.4 COMPARATIVE ANALYSIS
The comparative analysis of the proposed scheme with other existing schemes for the four cases
considered such as, black hole attack, flooding attack, and selective packet dropping attack, and
without attacks based on the three evaluation metrics.
5.4.1 ANALYSIS BASED ON THROUGHPUT
Figure.5 displays the comparative analysis plot of throughput for the four cases, like black hole
attack, flooding attack, selective packet dropping attack and without attack. Here, in the below
plots, the throughput is plotted against the simulation time. In figure 5.a, the throughput measure
of black hole attack at initial time 10 sec, is 0.732 for Fuzzy-FPSO, 0.702 for HIDS, 0.654 for
SVM-IDS, 0.660 for IIDPS. Similarly, at the final time 50 sec, the throughput values of different
approaches are, 0.634 for Fuzzy-FPSO, 0.59 for HIDS, 0.52 for SVM-IDS, and 0.543 for IIDPS.
In figure 5.b, the throughput value of flooding attack at initial time instant 10 sec, is 0.740 for
Fuzzy-FPSO, 0.691 for HIDS, 0.676 for SVM-IDS, 0.659 for IIDPS. Likewise, at the final time
instant 50 sec, the throughput values are as follows: 0.627 for Fuzzy-FPSO, 0.575 for HIDS,
0.523 for SVM-IDS, and 0.559 for IIDPS. In figure 5.c, the throughput measure of selective
packet dropping attack at initial time 10 sec is 0.725 for Fuzzy-FPSO, 0.729 for HIDS, 0.651 for
SVM-IDS, and 0.672 for IIDPS. Similarly, at the final time 50 sec, the throughput values of
different approaches are, 0.626 for Fuzzy-FPSO, 0.588 for HIDS, 0.527 for SVM-IDS, and 0.508
for IIDPS. In figure 5.d, the without attack throughput measure, at initial time 10 sec, for the
different approaches are, 0.875 for Fuzzy-FPSO, 0.849 for HIDS, 0.813 for SVM-IDS, and 0.829
for IIDPS. Likewise, at the final time 50 sec, the throughput values of different schemes are,
0.762 for Fuzzy-FPSO, 0.737 for HIDS, 0.668 for SVM-IDS, and 0.684 for IIDPS. The obtained
values deliberate that the throughput measure of all the schemes has decreased with the increase
in the simulation time. The maximum throughput value is attained by the proposed Fuzzy-FPSO
in all the considered four cases compared to the other existing methodologies. The upholding of
maximum throughput declares the newly devised scheme as the dominant methodology.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
28
Figure 5. Comparative analysis plot of throughput for (a) Black Hole attack, (b) Flooding attack,
(c) Selective Packet Dropping attack and, (d) without attack.
5.4.2 ANALYSIS BASED ON DELAY
The comparative analysis of delay plotted against the simulation time for the four cases, such as
black hole attack, flooding attack, selective packet dropping attack and without attack is depicted
in figure.6. In figure 6.a, the delay of the schemes for black hole attack at simulation time 10 sec,
for Fuzzy-FPSO is 0.023, HIDS is 0.031, SVM-IDS is 0.038, and IIDPS is 0.039. Similarly, the
delay at simulation time 50 sec for Fuzzy-FPSO is 0.044, HIDS is 0.049, SVM-IDS is 0.057, and
IIDPS is 0.057. In figure 6.b, the delay of the approaches for flooding attack at simulation time 10
sec, for Fuzzy-FPSO is 0.025, HIDS is 0.031, SVM-IDS is 0.041, and IIDPS is 0.039. Likewise,
the delay, at simulation time 50 sec, for Fuzzy-FPSO is 0.044, HIDS is 0.049, SVM-IDS is 0.063,
and IIDPS is 0.059. In figure 6.c, the delay of the schemes for selective packet drop attack, at
simulation time 10 sec, for Fuzzy-FPSO is 0.025, HIDS is 0.034, SVM-IDS is 0.038, and IIDPS
is 0.041. Correspondingly, the delay at simulation time 50 sec, for Fuzzy-FPSO is 0.044, HIDS is
0.049, SVM-IDS is 0.059, and IIDPS is 0.058. In figure 6.d, the delay of without attack case, for
different schemes, at simulation time 10 sec, for Fuzzy-FPSO is 0.014, HIDS is 0.019, SVM-IDS
is 0.025, and IIDPS is 0.033. Similarly, the delay at simulation time 50 sec, for Fuzzy-FPSO is
0.029, HIDS is 0.031, SVM-IDS is 0.052, and IIDPS is 0.051. The yielded delay measure
conveys that the delay increases with the increasing simulation time. In all the four cases, the
proposed Fuzzy-FPSO has the minimum delay compared to the other three schemes summarizing
the effectiveness of the proposed scheme.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
29
Figure 6. Comparative analysis plot of delay for (a) Black Hole attack, (b) Flooding attack, (c) Selective
Packet Dropping attack and (d) without attack.
5.4.3 ANALYSIS BASED ON DETECTION RATE
The comparative analysis of detection rate is carried out concerning simulation time for black
hole attack, flooding attack, selective packet dropping attack and without attack is pictured in
figure.7. In figure 7.a, the detection rate of the methodologies with black hole attack at simulation
time as 10 sec, for Fuzzy-FPSO is 0.472, HIDS is 0.453, SVM-IDS is 0.437, and IIDPS is 0.406.
Correspondingly, the detection rate at simulation time 50 sec, for Fuzzy-FPSO is 0.697, HIDS is
0.672, SVM-IDS is 0.621, and IIDPS is 0.6. In figure 7.b, the detection rate of the approaches for
flooding attack at simulation time 10 sec, for Fuzzy-FPSO is 0.555, HIDS is 0.487, SVM-IDS is
0.371, and IIDPS is 0.378. Likewise, the detection rate, at simulation time 50 sec, for Fuzzy-
FPSO is 0.688, HIDS is 0.659, SVM-IDS is 0.625, and IIDPS is 0.608. In figure 7.c, the detection
rate of the schemes, for selective packet drop attack, at simulation time 10 sec, for Fuzzy-FPSO is
0.573, HIDS is 0.495, SVM-IDS is 0.417, and IIDPS is 0.430. Correspondingly, the detection
rate, at simulation time 50sec, for Fuzzy-FPSO is 0.696, HIDS is 0.674, SVM-IDS is 0.607, and
IIDPS is 0.601. In figure 7.d, the detection rate for without attack case in different schemes at
simulation time 10 sec, for Fuzzy-FPSO is 0.707, HIDS is 0.669, SVM-IDS is 0.631, and IIDPS
is 0.645. Similarly, the detection rate at simulation time 50 sec, for Fuzzy-FPSO is 0.805, HIDS
is 0.782, SVM-IDS is 0.763, and IIDPS is 0.750. The determined detection rate measure reveals
the fact that the detection rate increases with the increase in simulation time. And the maximum
detection rate is achieved by the proposed Fuzzy-FPSO in comparison with the other existing
approaches justifying the proposed scheme as a productive one.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
30
Figure 7. Comparative analysis plot of detection rate for (a) Black Hole attack, (b) Flooding attack, (c)
Selective Packet Dropping attack and (d) without attack.
5.4.4 ANALYSIS BASED ON ROUTING OVERHEAD
The comparative analysis of routing overhead plotted against the simulation time for the four
cases, such as black hole attack, flooding attack, selective packet dropping attack and without
attack is depicted in Figure.8. Figure 8.a shows the routing overhead of the schemes for black
hole attack at simulation time 0, 10, 20, 30, 40, and 50 sec. At simulation time of 10 sec, the
routing overhead of Fuzzy-FPSO is 0.26376, HIDS is 0.32585, SVM-IDS is 0.39176, and IIDPS
is 0.38773. Similarly, the routing overhead at simulation time 50 sec for Fuzzy-FPSO is 0.44468,
HIDS is 0.48398, SVM-IDS is 0.61945, and IIDPS is 0.61384. Figure 8.b shows the routing
overhead of the schemes for flooding attack at simulation time 0, 10, 20, 30, 40, and 50 sec. At
simulation time of 10 sec, the routing overhead of the Fuzzy-FPSO is 0.27128, HIDS is 0.29508,
SVM-IDS is 0.39832, and IIDPS is 0.40236. Likewise, the routing overhead, at simulation time
50 sec, for Fuzzy-FPSO is 0.45453, HIDS is 0.49319, SVM-IDS is 0.60460, and IIDPS is
0.56270. Figure 8.c shows the routing overhead of the schemes for selective packet drop attack at
simulation time 0, 10, 20, 30, 40, and 50 sec. At simulation time of 10 sec, the routing overhead
of the Fuzzy-FPSO is 0.24550, HIDS is 0.30169, SVM-IDS is 0.40317, and IIDPS is 0.39508.
Correspondingly, the routing overhead at simulation time 50 sec, for Fuzzy-FPSO is 0.42143,
HIDS is 0.49683, SVM-IDS is 0.59616, and IIDPS is 0.60166. Figure 8.d shows the routing
overhead of schemes without attack case at simulation time 0, 10, 20, 30, 40, and 50 sec. In all
the four cases, the proposed Fuzzy-FPSO has the minimum routing overhead compared to the
other three schemes summarizing the effectiveness of the proposed scheme.
19. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
31
Figure 8. Comparative analysis plot of routing overhead for (a) Black Hole attack, (b) Flooding attack, (c)
Selective Packet Dropping attack and (d) without attack.
5.5 DISCUSSION
A comparative discussion of the proposed scheme with the existing scheme considering the three
evaluation metrics is made and shown in the below Table.2.
Table 2. Performance comparison of Fuzzy- FPSO with other existing schemes
20. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
32
The simulation results justify that the proposed scheme has the enhanced performance over the
existing HIDS, SVM-IDS, IIDPS schemes with maximum throughput, minimum delay and
maximum detection rate.
6. CONCLUSION
This research work contemplates to develop an IDPS for the threats in MANET by the
reinforcement of trust management and based on the proposed Fuzzy-FPSO detection algorithm.
All the secured feasible paths from source node to destination node are discovered based on trust
computation, and the optimal path is chosen by employing the proposed FPSO having trust and
distance as its objective function. The proposed scheme is implemented in a NS2 simulator, and
the performance is evaluated in terms of the four evaluation metrics, like throughput, delay,
detection rate and routing overhead. The three major attacks considered for performance
evaluation are flooding attack, selective packet dropping attack and black hole attack. The
simulation results of the proposed Fuzzy-FPSO provides the maximum throughput and detection
rate along with minimized delay and minimum routing overhead on contrasting with the existing
approaches like HIDS, SVM-IDS, and IIDPS.
REFERENCES
[1] M. Nekovee, and R. S. Saksena,“Simulations of large-scale Wi-Fi-based wireless networks,”
Interdisciplinary challenges and applications, Future Generation Computer Systems, vol. 26, no. 3,
pp. 514–520, 2010.
[2] Poonam Joshi, Pooja Nande, Ashwini Pawar, Pooja Shinde, and Rupali Umbare, "EAACK-A Secure
Intrusion Detection And Prevention System For MANETS," in proceedings of IEEE International
Conference on Pervasive Computing (ICPC), pp. 1-6, 2015.
[3] Babu, M. Rajesh, and G. Usha, "A Novel Honeypot Based Detection and Isolation Approach
(NHBADI) to Detect and Isolate Black Hole Attacks in MANET," Wireless Personal
Communications, vol. 90, no. 2, pp. 831-845, 2016.
[4] arrukh Aslam Khan, Muhammad Imran, Haider Abbas, and Muhammad Hanif Durad, "A detection
and prevention system against collaborative attacks in Mobile Ad hoc Networks," Future Generation
Computer Systems, vol. 68, pp. 416-427, 2017
[5] Basant Subba , Santosh Biswas, and Sushanta Karmakar, "Intrusion detection in Mobile Ad-hoc
Networks: Bayesian game formulation," Engineering Science and Technology, an International
Journal, vol. 19, no.2, pp. 782-799, 2016.
[6] Marchang, Ningrinla, Raja Datta, and Sajal K. Das, "A Novel Approach for Efficient Usage of
Intrusion Detection System in Mobile Ad Hoc Networks," IEEE Transactions on Vehicular
Technology, vol. 66, no. 2, pp. 1684-1695, 2017.
[7] Usha, G., M. Rajesh Babu, and S. Saravana Kumar, "Dynamic anomaly detection using cross layer
security in MANET," Computers & Electrical Engineering, pp.1-11, 2016.
[8] Erfan A Shams, and Ahmet Rizaner, "A Novel Support Vector Machine Based Intrusion Detection
System For Mobile Ad Hoc Networks," Wireless Networks, pp. 1-9, 2017.
[9] Nadeem, Adnan, and Michael P. Howarth, "A survey of MANET intrusion detection & prevention
approaches for network layer attacks," IEEE communications surveys & tutorials, vol. 15, no. 4, pp.
2027-2045, 2013.
[10] Opinder Singh, Jatinder Singh, and Ravinder Singh, "An Intelligent Intrusion Detection and
Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes," Indian Journal
of Science and Technology, vol. 8, no. 1, pp. 1-12, 2017.
[11] Hamed Janzadeh, Kaveh Fayazbakhsh, Mehdi Dehghan, and Mehran S. Fallah, ”A secure credit-
based cooperation stimulating mechanism for MANETs using hash chains,” Future Generation
Computer Systems, vol. 25, no. 8, pp. 926-934, 2009.
[12] Soni M, Ahirwa M, and Aggarwal S, “A Survey on Intrusion Detection in MANET,” in proceedings
of International Conference on Computational Intelligence and Communication Networks, pp. 1027-
1032, 2015.
21. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January 2018
33
[13] Djahel S, Farid N, and Zhang Z, “Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks:
Proposals and Challenges,” IEEE communications surveys and tutorials, vol. 13, no. 4, pp. 658-672,
2011
[14] H. Debar, M. Dacier and A.Wespi, “A Revised Taxonomy for Intrusion Detection Systems,” Annals
of Telecommunications, Vol.55, No.7, pp 361-378, July 2000.
[15] Adnan Nadeem, and Michael Howarth, "A generalized intrusion detection and prevention mechanism
for securing MANETs," in proceedings of ICUMT09 International Conference on Ultra Modern
Telecommunications and Workshops, pp. 1-6, 2009.
[16] Y. Harold Robinson and M. Rajaram, "Energy-Aware Multipath Routing Scheme Based on Particle
Swarm Optimization in Mobile Ad Hoc Networks", Scientific World Journal, Hindawi Publishing
Corporation, Vol. 2015, Article ID 284276, pp. 1-9, 2015.
[17] Vikas Gupta , Ashok Verma, Ajay Lala and Ashish Chaurasia, "Scenario Based Performance and
Comparative Simulation Analysis of Routing Protocols in MANET," IJCSNS International Journal of
Computer Science and Network Security, Vol.13, No.6, June 2013.
[18] Anupam Das and M. Mahfuzul Islam,"SecuredTrust: A Dynamic Trust Computation Model for
Secured Communication in Multi-Agent Systems", IEEE Transactions on dependable and secure
computing, Vol.9, No.2, 2012
[19] A. Sharma and P.K. Johari, "Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in
Mobile Ad-hoc Network,” International Journal of Computer Sciences and Engineering, Vol.5, No.5,
pp. 2347-2693, May 2017.
[20] Mohammed Abdel-Azim, Hossam El-Din Salah and Menas Ibrahim, "Black Hole attack Detection
using Fuzzy based IDS," International Journal of Communication Networks and Information Security
(IJCNIS), Vol.9, No.2, August 2017.
[21] Iztok Fister, IztokFisterJr, Xin-SheYang and JanezBrest, "A comprehensive review of firefly
algorithms," Swarm and Evolutionary Computation, Vol.13, pp.34-46, December 2013.
[22] Xin-She Yang, "Firefly Algorithm, Nature-Inspired Metaheuristic Algorithms," Computers, Luniver
Press, pp.79–90, 2008.
[23] Dongshu Wang, Dapei Tan and Lei Liu, "Particle Swarm Optimization Algorithm: An overview,"
Soft Computing, pp.1–22, January 2017.
[24] Dian Palupi Rini, Siti Mariyam Shamsuddin and Siti Sophiyati Yuhaniz, "Particle Swarm
Optimization: Technique, System and Challenges," International Journal of Computer Applications,
Vol.14, No.1, January 2011.
[25] Mahmood K. Ibrahem , Ameer M. Aboud, "A Secure Routing Protocol for MANET," International
Journal of Computer Science Engineering and Technology( IJCSET), Vol.4, No.7, July 2014.
[26] Nisha Soms and P.Malathi, "Evolution of Intrusion Detection System in MANETs – A Survey,"
International Journal of Innovations & Advancement in Computer Science(IJIACS), Vol.6, No.5,
May 2017.
AUTHORS
Mr.Ramireddy Kondaiah received his B.Sc Degree in Mathematics, Physics and
Chemistry from Sri Venkateswara University,Tirupti, A.P , India in 1996, Master of
Computer Applications from Sri Krishna Devaraya University Campus College affiliated
to Sri Krishna Devaraya University in 2000.Now He is pursuing Ph.D. from Rayalaseema
University,Kurnool ,AndhraPradesh,India. His research areas Include Computer
Networks/MANET Routing with Intrusion Detection.
Prof. B. Sathyanarayana received his B.Sc Degree in Mathematics, Economics and
Statistics from Madras University, India in 1985, Master of Computer Applications from
Madurai Kamaraj University in 1988. He did his Ph.D in Computer Networks from Sri
Krishnadevaraya University, Anantapur, A.P. India. He has 24 years of teaching
experience. His Current Research Interest includes Computer Networks, Network Security
and Intrusion Detection. He has published 30 research papers in National and International
journals.