Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Arjita Singh Sengar, Pankaj Soni

Arjita Singh Sengar and Pankaj Soni. An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF. International Journal of Computer Applications 161(10):27-32, March 2017. BibTeX

	author = {Arjita Singh Sengar and Pankaj Soni},
	title = {An Intrusion Detection System for Combating Attacks against Cognitive Radio Networks using OSPF},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {10},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {27-32},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017913340},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In this paper, the method of Intrusion Detection System (IDS) is implemented, which is based on the principle of network, nodes or information misuse detection system, which can accurately compare the signatures of known attacks and has a low rate of packet dropout’s alarms.

Security is a major concern in wireless technology and this work deals with security in wireless mobile ad-hoc network by using Novel IDS in Open Shortest Path First (OSPF) routing protocol. We are bounding wireless mobile ad-hoc network nodes to getting updates from unknown or unwanted nodes on the same network through routing table; we are using a Novel intrusion detection technique with the help of routing protocols in the MANET (mobile ad hoc network).

MANET is very popular, efficient, easy and secure way of communication between two or more mobile user ends and we can send and receive data, information, updates and signals from one end to another known end securely by using Novel IDS technique and by blocking unknown nodes in MANET. We are using NS2 simulation tool for performing our method.


  1. Zubair Md. Fadlullah, Hiroki Nishiyama, and Nei Kato, “An Intrusion Detection System (IDS) For Combating Attacks Against cognitive Radio Network,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May 2013.
  2. Mostafa M. Fouda, Tohoku University and Benha University”An Intrusion Detection System (IDS) For Combating Attacks Against cognitive Radio Network,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, June 2013”.
  3. C. Cordeiro, K. Challapali, and D. Birru, “IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios,” Journal of Communications, vol. 1, no. 1, pp. 38-47, Apr. 2006.
  4. O. Leon, R. Roman, and J. H. Serrano, “Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks”, in Procw Orkshopon Wireless Cooperative Network Security (WCNS’11), Valencia, Spain, May 2011.
  5. O. Leon, J. Hernandez-Serrano, and M. Soriano, “Securing cognitive radio networks”, in International Journal of Communication Systems, vol. 23, no. 5, pp. 633-652, May 2010.
  6. W. El-Hajj, H. Safa, and M. Guizani, “Survey of Security Issues in Cognitive Radio Networks,” Journal of Internet Technology (JIT), vol. 12, no. 2, pp.181-198, Mar. 2011.
  7. S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto,“Detecting Blackhole Attack on OSPF-based Mobile Ad Hoc Networks by Dynamic Learning Method,” International Journal of Network Security, Vol. 5, No. 3, pp. 338-346, Nov. 2007.
  8. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A Jamalipour, “A Survey of Routing Attacks in Mobile Ad Hoc Networks”, IEEE Wireless Communications, vol. 14, no. 5, 85-91, Oct. 2007.
  9. Z. M. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, and N. Kato, “DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis,” IEEE/ACM Transactions on Networking, vol. 18, no. 4, pp. 1234-1247, Aug. 2010.
  10. K. Ju and K. Chung, “Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 149-154, Apr. 2012.
  11. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proc. ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’05), Urbana-Champaign, Illinois, USA, May 2005.
  12. H. Wang, D. Zhang, and K. G. Shin, “Change-Point Monitoring for Detection of DoS Attacks,” IEEE Trans. on Dependable and Secure Computing, vol. 1, no. 4, pp. 193-208, Oct. 2004.
  13. Jangkyu Yun, Seungyong Oh, Junhyung Kim, Sukgyu Lee, Kijun Han “An Implementation of OSPF Routing Protocol withMulti-Metrics” International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 2010.
  14. Sethi and Udgata,“Optimized and Reliable Ad hoc On-demand Distance Vector (OROSPF)” International Journal of Computer Applications(0975-8887)Volume3-No.10,July 2010.
  15. Kowshika , Maheswari, karthik “an efficient packet forwarding in MANET with OSPF using random way point mobility model” journal of mathematics and technology, issn: 2078-0257, no.3, august, 2010.
  16. J.Premalatha, P.Balasubramanie, Enhancing Quality of Service in MANETS by Effective Routing, IEEE. ICWCSC 2010.
  17. Li Yuanzhou, Hu Weihua, Optimization Strategy for Mobile Ad Hoc Network Based on OSPF Routing Protocol, IEEE. 978-1-4244-3709-2/10,2010
  18. C.E. Perkins, E.M. Belding-Royer, and I.D. Chakeres “Ad Hoc on Demand Distance Vector (OSPF) Routing” IETF Internet draft, Oct. 2003.
  19. Parma Nand, S.C. Sharma, Rani Astya,Simulation Based Parametric Analysis of OSPF Protocol for Ad-hoc Network Published in International Journal of Advanced Engineering & Applications,Jan. 2010


Open Shortest Path First (OSPF), MANET (mobile ad hoc network), Intrusion Detection System (IDS), Ad hoc on Demand Routing Protocol (AODV), Dynamic Source Routing Protocol (DSR).