Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud

被引:8
|
作者
Alghamdi, Saleh A. [1 ]
机构
[1] Al Baha Univ, Fac Engn, Comp Engn Dept, Al Baha, Saudi Arabia
关键词
MANET; Cloud; 5G networks; Intrusion detection and prevention; Trust management; Peek monitor; AD HOC CLOUD; NODES; CRYPTOGRAPHY; MITIGATION; FRAMEWORK; NETWORKS; ATTACKS;
D O I
10.1007/s10207-020-00531-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues in MANETs. Security is highly important in MANET and cloud environments for preventing harmful attacks. Therefore, a trusted environment is required for a MANET with cloud-based 5G communications. In this paper, we propose a new framework called trust-aware intrusion detection and prevention system (TA-IDPS) for protecting the network from adversaries. TA-IDPS consists of a MANET, a cloudlet, and a cloud service layer. Initially, we register and authenticate mobile nodes using an ultra-lightweight symmetric cryptographic technique, which is highly suitable for resource-constrained environments. In MANETs, high energy consumption, scalability, and authentication are important issues, which are addressed by the proposed moth flame optimization algorithm. If the cluster head (CH) receives data packets from a source node, they are classified as normal, malicious, and suspicious using a deep belief network. Intra-cluster routing is implemented by an adaptive Bayesian estimator using next-best forwarder selection. In the cloudlet layer, cloudlets are used to aggregate packets from the CH and verify their legitimacy so that they can be forwarded to the cloud service layer. Each cloudlet is provided with a peek monitor for classifying suspicious packets as malicious and normal using Awads information entropy. Experiments are conducted using NS3.26. The performance of the proposed TA-IDPS and previous methods is analyzed using widely used metrics. The evaluation results demonstrated that the proposed TA-IDPS system outperformed the previous methods in terms of all metrics.
引用
收藏
页码:469 / 488
页数:20
相关论文
共 50 条
  • [21] Trust-Aware Routing Protocol Using Hierarchical Manta Ray Foraging Optimization Algorithm With Selfish Node Detection in MANET
    Jeganathan, Suresh
    Kulandaivelu, Gunasekaran
    Muthusamy, Dhurgadevi
    Samraj, Kishore Verma
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (05)
  • [22] FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network
    Mirzaee, Parya Haji
    Shojafar, Mohammad
    Pooranian, Zahra
    Asefy, Pedram
    Cruickshank, Haitham
    Tafazolli, Rahim
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 215 - 222
  • [23] Attack modeling and intrusion detection system for 5G wireless communication network
    Gupta, Akhil
    Jha, Rakesh Kumar
    Jain, Sanjeev
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (10)
  • [24] Intrusion Detection System on IoT with 5G Network Using Deep Learning
    Yadav, Neha
    Pande, Sagar
    Khamparia, Aditya
    Gupta, Deepak
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [25] Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
    Veeraiah, Neenavath
    Krishna, B. Tirumala
    WIRELESS NETWORKS, 2019, 25 (07) : 4021 - 4035
  • [26] Intrusion Detection System on IoT with 5G Network Using Deep Learning
    Yadav, Neha
    Pande, Sagar
    Khamparia, Aditya
    Gupta, Deepak
    Wireless Communications and Mobile Computing, 2022, 2022
  • [27] Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
    Neenavath Veeraiah
    B. Tirumala Krishna
    Wireless Networks, 2019, 25 : 4021 - 4035
  • [28] Trust System Based Intrusion Detection In Mobile Ad-hoc Network (MANET)
    Nanaware, Pradnya M.
    Babar, Sachin D.
    2016 INTERNATIONAL CONFERENCE ON NEXT GENERATION INTELLIGENT SYSTEMS (ICNGIS), 2016, : 283 - 286
  • [29] Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing
    Ravji, Sajaan
    Ali, Maaruf
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 95 - 100
  • [30] An intrusion detection and prevention system in cloud computing: A systematic review
    Patel, Ahmed
    Taghavi, Mona
    Bakhtiyari, Kaveh
    Celestino Junior, Joaquim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 25 - 41