CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

High Security for MANET using Intrusion Detection and Authentication with Data Fusion on Leaders

by Fidalcastro. A, Baburaj. E
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 9
Year of Publication: 2013
Authors: Fidalcastro. A, Baburaj. E
10.5120/11109-0181

Fidalcastro. A, Baburaj. E . High Security for MANET using Intrusion Detection and Authentication with Data Fusion on Leaders. International Journal of Computer Applications. 66, 9 ( March 2013), 1-5. DOI=10.5120/11109-0181

@article{ 10.5120/11109-0181,
author = { Fidalcastro. A, Baburaj. E },
title = { High Security for MANET using Intrusion Detection and Authentication with Data Fusion on Leaders },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 9 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number9/11109-0181/ },
doi = { 10.5120/11109-0181 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:53.125961+05:30
%A Fidalcastro. A
%A Baburaj. E
%T High Security for MANET using Intrusion Detection and Authentication with Data Fusion on Leaders
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 9
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a novel architecture for security in Mobile Adhoc Networks using Intrusion Detection and Authentication with Data Fusion along with clustering technique and leader election model. Here clusters are formed through fixed width algorithm and it elects the leader node in each cluster with the help of neighbor ranking mechanism. Leader helps in finding out the intruder in the cluster and sends them out of the network by using Intrusion Detection System and Authentication device that are implemented only in leader node, so leader node is able to detect the intruder. To overcome the demerits in unimodal biometric system, Multimodal biometrics is set to work with IDS. Each and every device has dimensions and estimation limitations, many devices to be selected with the help of Dempster-Shafter theory for data fusion. Based on the security posture, system concludes which biosensor (IDS) to select and decide user need authentication (or IDS input) is essential. By every authentication device and Intrusion Detection System (IDS), the decisions are made in a fully distributed manner. Simulation results demonstrate that the novel architecture is efficient and accurate.

References
  1. Portnoy, L. , Eskin, E. And Stolfo, S. (2001), "Intrusion detection with unlabeled data using clustering," in proceedings of the Workshop on Data Mining for Security Applications, November 2001.
  2. Vasudevan, S. DeCleene, B. , Immerman, N. , Kurose, J. and Towsley, D. (2003), "Leader Election Algorithms for Wireless Ad Hoc Networks," Proc. IEEE DARPA Information Survivability Conf. and Exposition.
  3. Mohammed, N. , Otrok, H. , Wang, L. , Debbabi, M. , and Bhattacharya, P. (2008), "A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in Manets," Proc. IEEE WirelessComm. and Networking Conf. (WCNC).
  4. J. Liu, F. Yu, C. H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun. , vol. 8, no. 2,pp. 806–815, Feb. 2009.
  5. T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, "Continuous verification using multimodal biometrics," IEEE Trans. Pattern Anal. Mach. Intell. ,vol. 29, no. 4, pp. 687–700, Apr. 2007.
  6. Y. Zhao, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificate less public keys," IEEE Trans. Dependable Secure Comput. , vol. 3, no. 4, pp. 386–399, Oct. –Dec. 2006.
  7. T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput. , vol. 9, no. 6, pp. 35–41, Nov. 2005.
  8. A. Mishra, K. Nadkarni, and V. T. A. Patcha, "Intrusion detection in wireless ad-hoc networks," IEEE Wireless Commun. , vol. 11, no. 1, pp. 48–60, Feb. 2004.
  9. K. K. Lakshmi Narayanan and A. Fidal Castro, "High Security for Manet Using Authentication and Intrusion Detection with Data Fusion," International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 1 ISSN 2229-5518
  10. Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung-Jo Han "A Novel Cross Layer Intrusion Detection System in MANET" 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Index Terms

Computer Science
Information Sciences

Keywords

MANET Intrusion Detection System Authentication Leader election Fixed width algorithm Security