Detection and prevention of spoofing attacks in mobile adhoc networks using hybrid optimization algorithm

被引:4
作者
Visalakshi, P. [1 ]
Prabakaran, S. [1 ]
机构
[1] SRM Univ, Dept CSE, Chennai, Tamil Nadu, India
关键词
Mobile ad hoc network (MANETs); optimal intrusion detection system (OIDS); hybrid optimization algorithm (HOA); improved whale optimization (IWO); intrusion detection system (IDS); spoofing attack; trust degree; AD-HOC NETWORKS; INTRUSION-DETECTION; PROTOCOL; SCHEME; SECURE; SYSTEM;
D O I
10.3233/JIFS-182881
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The nature of mobile nodes are affects the performance of MANET. The main requirement of secured MANET is use of secure protocols which ensure the network integrity, confidentiality, availability and authenticity. Recently, the secure protocols have been used to resists such attacks in MANET. Spoofing attack is one of them, which affects network by an attacker program successfully acts on another node behalf by impersonating data. In this paper, we investigate the spoofing attack problems in MANET and propose an optimal intrusion detection system (OIDS) using hybrid optimization algorithm (HOA) named as OIDS-HOA. Here, we propose an improved whale optimization (IWO) algorithm for efficient cluster formation and a cluster chain weight metrics approach (CCWW) for trust degree computation of each mobile node. Moreover, the intrusion detection system (IDS) is done by the condition check algorithm and the intrusion response action (IRA) is performed by average route trust with three different responses are: No Punishment (NP), Route Change (RC) and Route Isolate (RI). The simulation results show that the effectiveness of proposed OIDS-HOA scheme in terms of packet delivery fraction, end-end-delay, energy consumption, overhead and packet drop ratio.
引用
收藏
页码:1691 / 1704
页数:14
相关论文
共 35 条
[1]   Lightweight Sybil Attack Detection in MANETs [J].
Abbas, Sohail ;
Merabti, Madjid ;
Llewellyn-Jones, David ;
Kifayat, Kashif .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :236-248
[2]  
[Anonymous], 2011, INT J ADV COMPUTER S, V2
[3]   A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET [J].
Babu, M. Rajesh ;
Usha, G. .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) :831-845
[4]   On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks [J].
Boppana, Rajendra V. ;
Su, Xu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) :1162-1174
[5]   An efficient intrusion detection in resource-constrained mobile ad-hoc networks [J].
Bouhaddi, Myria ;
Radjef, Mohammed Said ;
Adi, Kamel .
COMPUTERS & SECURITY, 2018, 76 :156-177
[6]   FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems [J].
Dhurandher, Sanjay K. ;
Obaidat, Mohammad S. ;
Verma, Karan ;
Gupta, Pushkar ;
Dhurandher, Pravina .
IEEE SYSTEMS JOURNAL, 2011, 5 (02) :176-188
[7]   Quality of service for pocket telephony over mobile ad hoc networks [J].
Giacomazzi, P ;
Musumeci, L ;
Caizzone, G ;
Verticale, G ;
Liggieri, G ;
Proietti, A ;
Sabatini, S .
IEEE NETWORK, 2006, 20 (01) :12-20
[8]   Data replication for improving data accessibility in ad hoc networks [J].
Hara, Takahiro ;
Madria, Sanjay K. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (11) :1515-1532
[9]   Energy-efficient deployment of intelligent mobile sensor networks [J].
Heo, N ;
Varshney, PK .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2005, 35 (01) :78-92
[10]   Wormhole attacks in wireless networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :370-380