CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF

by Arjita Singh Sengar, Pankaj Soni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 10
Year of Publication: 2017
Authors: Arjita Singh Sengar, Pankaj Soni
10.5120/ijca2017913340

Arjita Singh Sengar, Pankaj Soni . An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF. International Journal of Computer Applications. 161, 10 ( Mar 2017), 27-32. DOI=10.5120/ijca2017913340

@article{ 10.5120/ijca2017913340,
author = { Arjita Singh Sengar, Pankaj Soni },
title = { An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 10 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number10/27185-2017913340/ },
doi = { 10.5120/ijca2017913340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:27.574854+05:30
%A Arjita Singh Sengar
%A Pankaj Soni
%T An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 10
%P 27-32
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, the method of Intrusion Detection System (IDS) is implemented, which is based on the principle of network, nodes or information misuse detection system, which can accurately compare the signatures of known attacks and has a low rate of packet dropout’s alarms. Security is a major concern in wireless technology and this work deals with security in wireless mobile ad-hoc network by using Novel IDS in Open Shortest Path First (OSPF) routing protocol. We are bounding wireless mobile ad-hoc network nodes to getting updates from unknown or unwanted nodes on the same network through routing table; we are using a Novel intrusion detection technique with the help of routing protocols in the MANET (mobile ad hoc network). MANET is very popular, efficient, easy and secure way of communication between two or more mobile user ends and we can send and receive data, information, updates and signals from one end to another known end securely by using Novel IDS technique and by blocking unknown nodes in MANET. We are using NS2 simulation tool for performing our method.

References
  1. Zubair Md. Fadlullah, Hiroki Nishiyama, and Nei Kato, “An Intrusion Detection System (IDS) For Combating Attacks Against cognitive Radio Network,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May 2013.
  2. Mostafa M. Fouda, Tohoku University and Benha University”An Intrusion Detection System (IDS) For Combating Attacks Against cognitive Radio Network,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, June 2013”.
  3. C. Cordeiro, K. Challapali, and D. Birru, “IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios,” Journal of Communications, vol. 1, no. 1, pp. 38-47, Apr. 2006.
  4. O. Leon, R. Roman, and J. H. Serrano, “Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks”, in Procw Orkshopon Wireless Cooperative Network Security (WCNS’11), Valencia, Spain, May 2011.
  5. O. Leon, J. Hernandez-Serrano, and M. Soriano, “Securing cognitive radio networks”, in International Journal of Communication Systems, vol. 23, no. 5, pp. 633-652, May 2010.
  6. W. El-Hajj, H. Safa, and M. Guizani, “Survey of Security Issues in Cognitive Radio Networks,” Journal of Internet Technology (JIT), vol. 12, no. 2, pp.181-198, Mar. 2011.
  7. S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto,“Detecting Blackhole Attack on OSPF-based Mobile Ad Hoc Networks by Dynamic Learning Method,” International Journal of Network Security, Vol. 5, No. 3, pp. 338-346, Nov. 2007.
  8. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A Jamalipour, “A Survey of Routing Attacks in Mobile Ad Hoc Networks”, IEEE Wireless Communications, vol. 14, no. 5, 85-91, Oct. 2007.
  9. Z. M. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, and N. Kato, “DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis,” IEEE/ACM Transactions on Networking, vol. 18, no. 4, pp. 1234-1247, Aug. 2010.
  10. K. Ju and K. Chung, “Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 149-154, Apr. 2012.
  11. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proc. ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’05), Urbana-Champaign, Illinois, USA, May 2005.
  12. H. Wang, D. Zhang, and K. G. Shin, “Change-Point Monitoring for Detection of DoS Attacks,” IEEE Trans. on Dependable and Secure Computing, vol. 1, no. 4, pp. 193-208, Oct. 2004.
  13. Jangkyu Yun, Seungyong Oh, Junhyung Kim, Sukgyu Lee, Kijun Han “An Implementation of OSPF Routing Protocol withMulti-Metrics” International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 2010.
  14. Sethi and Udgata,“Optimized and Reliable Ad hoc On-demand Distance Vector (OROSPF)” International Journal of Computer Applications(0975-8887)Volume3-No.10,July 2010.
  15. Kowshika , Maheswari, karthik “an efficient packet forwarding in MANET with OSPF using random way point mobility model” journal of mathematics and technology, issn: 2078-0257, no.3, august, 2010.
  16. J.Premalatha, P.Balasubramanie, Enhancing Quality of Service in MANETS by Effective Routing, IEEE. ICWCSC 2010.
  17. Li Yuanzhou, Hu Weihua, Optimization Strategy for Mobile Ad Hoc Network Based on OSPF Routing Protocol, IEEE. 978-1-4244-3709-2/10,2010
  18. C.E. Perkins, E.M. Belding-Royer, and I.D. Chakeres “Ad Hoc on Demand Distance Vector (OSPF) Routing” IETF Internet draft, Oct. 2003.
  19. Parma Nand, S.C. Sharma, Rani Astya,Simulation Based Parametric Analysis of OSPF Protocol for Ad-hoc Network Published in International Journal of Advanced Engineering & Applications,Jan. 2010
Index Terms

Computer Science
Information Sciences

Keywords

Open Shortest Path First (OSPF) MANET (mobile ad hoc network) Intrusion Detection System (IDS) Ad hoc on Demand Routing Protocol (AODV) Dynamic Source Routing Protocol (DSR).