CFP last date
22 April 2024
Reseach Article

Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique

by V. Umadevi, C. Chandrasekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 7
Year of Publication: 2015
Authors: V. Umadevi, C. Chandrasekar
10.5120/ijca2015907445

V. Umadevi, C. Chandrasekar . Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique. International Journal of Computer Applications. 132, 7 ( December 2015), 1-8. DOI=10.5120/ijca2015907445

@article{ 10.5120/ijca2015907445,
author = { V. Umadevi, C. Chandrasekar },
title = { Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 7 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number7/23603-2015907445/ },
doi = { 10.5120/ijca2015907445 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:29.307117+05:30
%A V. Umadevi
%A C. Chandrasekar
%T Removal of Malicious Attacks using Hybrid Symmetric Cryptograhic Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 7
%P 1-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in Mobile Ad-hoc Network (MANET) plays an important role for providing effective network service without any malicious attack. Intrusion detection is crucial in improving the performance of mobile ad-hoc network. Intrusion detection monitors the activities in a mobile system by collecting the information and then analyzing them. Most previous works for intrusion detection use the current acknowledgement and location-based routing protocol to combat against the intrusion detection. In this work to secure the mobile network system from malicious attacks, Hybrid Symmetric Cryptography Technique (HSCT) is introduced. The HSCT uses Advanced Encryption Standard (AES) and Message Digest 5 (MD5). Advanced Encryption Standard (AES) is based on the principle of substitution and permutation keying model adapted as node ids in the mobile ad-hoc network. AES ensures higher amount of packets being transmitted with minimum packet delay. The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words in mobile nodes to remove the malicious attack. AES and MD5 fused together on the mobile nodes to communicate packets with high security. The HSCT algorithms offer data security and users authenticity using a mixture of two symmetric cryptographic techniques. HSCT measure and analyze different parameters such as true positive rate on detecting abnormal activities, packet delay, rate of intrusion being detected with respect to node density and packets being transmitted. The HSCT is simulated using NS2. Experiment results show that the proposed technique achieves better performance in considerably minimizing the packet delay rate by 33.36% and improves the true positive rate on detecting abnormal activities by 25.83% compared to the state-of-the-art works.

References
  1. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE Transactions on Industrial Electronics, Volume 60, Issue 3, March 2013, Pages 1089-1098.
  2. Haiying Shen, and Lianyu Zhao, “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”, IEEE Transactions on Mobile Computing, Volume 12, Issue 6, June 2013, Pages 1079-1093.
  3. Shengrong Bu, F. Richard Yu, Xiaoping P. Liu, and Helen Tang, “Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks”, IEEE Transactions on Wireless Communications, Volume 10, Issue 9, September 2011, Pages 3064-3073.
  4. Ming-Yang Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Elsevier, Computer Communications, Volume 34, Issue 1, 15 January 2011, Pages 107–117.
  5. Thomas F. La Porta, Gaia Maselli, and Chiara Petrioli, “Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization”, IEEE Transactions on Mobile Computing, Volume 10, Issue 2, February 2011, Pages 267-279.
  6. Kiran Mehta, Donggang Liu, “Protecting Location Privacy in Sensor Networks against a Global Eavesdropper”, IEEE Transactions on Mobile Computing, Volume 11, Issue 2, February 2012, Pages 320-336.
  7. Hyun-A Park, Jong Wook Hong, Jae Hyun Park,Justin Zhan, and Dong Hoon Lee, “Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService”, IEEE Transactions on Mobile Computing, Volume 9, Issue 6, June 2010, Pages 824-837.
  8. Shengbo Yang, Chai Kiat Yeo, and Bu Sung Lee, “Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Volume 11, Issue 1, January 2012, Pages 111-124.
  9. Anh Le, and Athina Markopoulou, “Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac”, IEEE Journal on Selected Areas In Communications, Volume 30, Issue 2, February 2012, Pages 442-449.
  10. Mingyan Li, Iordanis Koutsopoulos, and Radha Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Volume 9, Issue 8, August 2010, Pages 1119-1133.
  11. Haitao Wu, Zhenqian Feng, Chuanxiong Guo, and Yongguang Zhang, “ICTCP: Incast Congestion Control for TCP in Data-Center Networks”, IEEE/ACM Transactions on Networking, Volume 21, Issue 2, April 2013, Pages 345-358.
  12. Zhichao Zhu, and Guohong Cao, “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System”, IEEE Transactions on Mobile Computing, Volume 12, Issue 1, January 2013, Pages 51-64.
  13. Eugene Y. Vasserman and Nicholas Hopper, “Vampire attacks:Draining life from wireless ad-hoc sensor networks”, IEEE Transactions on Mobile Computing, Volume 12 Issue 2 , Year 2013, Pages 1-15.
  14. Arif Selcuk Uluagac, Raheem A. Beyah, Yingshu Li, and John A. Copeland, “VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks” IEEE Transactions on Mobile Computing, Volume 9, Issue 7, July 2010, Pages 994-1006.
  15. Shafiullah Khan, Kok-Keong Loo, and Zia Ud Din, “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks” International Arab Journal of Information Technology, Volume 7, Issue 4, October 2010, Pages 435-440.
  16. M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, and Mathiyalagan Palaniappan, “Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version”, Hindawi Publishing Corporation, Scientific World Journal, Volume 2015, August 2015, Pages 1-11.
  17. Jaeun Choi, Gisung Kim, and Sehun Kim,“A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2012, June 2012, Pages 1-7.
  18. Nabil Ali Alrajeh, S. Khan, and Bilal Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2013, April 2013, Pages 1-7.
  19. A. L. Sandoval Orozco, J. GarciıaMatesanz, L. J. Garcia Villalba, J. D. Marquez Diaz, and T-H Kim, “Security Issues inMobile Ad Hoc Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2012, October 2012, Pages 1-6.
  20. Mouhannad Alattar, Francoise Sailhan, and Julien Bourgeois, “On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2013, April 2013, Pages 1-21.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Intrusion detection Location-based routing protocol Symmetric Cryptography Advanced Encryption Standard Message Digest