Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Cross centric intrusion detection system for secure routing over black hole attacks in MANETs

Published: 15 December 2019 Publication History

Abstract

Due to the constraint of resources in Mobile Adhoc Network (MANET), usually mobile nodes do not gain perfect routing efficiency. This routing efficiency will be reduced by several numbers of data blockages and the communication time in the routing path. There are many data blockages arising, especially Black Hole Attack (BHA) is a massive anomalous attack in routing. This may cause the efficiency of communication time between nodes. In this juncture, the availability of Intrusion Detection System with Cross centric network which is overloaded with routing path packets, so it is easily affected by the BHA. To decrease the impact of black hole attack using Cross Centric Network Intrusion Detection System, this research proposes the CniDsor framework. CniDsor framework is a diminutive form of the “Cross Centric Intrusion Detection System for Secure Routing over Black Hole Attacks in MANETs”. This system is used to prevent the Black Hole Attacks over the Secure Routing. CniDsor works based on the Path Origin Selection, Priority Portion Assignment (PPA) and IDS attack reduction. In this study, path origin selection utilizes secure routing by “PIHNSPRA Routing Algorithm” and it selects the path from end to end nodes with secure manner and reduces the black-hole attack. Meanwhile, priority portion assignment is used to manage the node position and network monitoring by the “Past Interaction History”. Finally, CniDsor framework provides secure IDS communication efficiency in MANET which is used to accomplish the efficient routing path. Moreover, the proposed CniDsor framework works better and minimizes the communication overhead, packet delay and end to end delay, thus increases the network lifetime, packet delivery ratio (PDR).

References

[1]
Umang S., Reddy B.V.R., Hoda M.N., Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption, IET Commun. 4 (17) (2010) 2084–2094.
[2]
Rajendran N., Jawahar P.K., Intrusion detection of routing attacks in MANETs using cross centric attacks framework, J. Adv. Res. Dyn. Control Syst. 10 (07-special issue) (2018) 551–562.
[3]
Bhat S., Rouskas G.N., Katib I., On time dependent routing algorithms for open marketplaces of path services with support for in-advance path reservation, Comput. Netw. 138 (2018) 201–212.
[4]
Guo H., Wang X., Cheng H., Huang M., A location aided controlled spraying routing algorithm for delay tolerant networks, Ad Hoc Netw. (Elsevier) 66 (2017) 16–25.
[5]
AlRukaibi F., Alrukaibi D., Alkheder S., Alojaiman S., Sayed T., Optimal route risk-based algorithm for hazardous material transport in Kuwait, J. Loss Prev. Process Ind. 52 (2018) 40–53.
[6]
Hedderich Mareike, Fastenrath Ulrich, Isaac Gordon, Bogenberger Klaus, Adapting the A* algorithm for park spot routing, Transport. Res. Proce. 27 (1) (2017) 1066–1073.
[7]
Rahaman M.S., Mei Y., Hamilton M., Salim F.D., CAPRA: A contour-based accessible path routing algorithm, Inform. Sci. 385 (2017) 157–173.
[8]
Pham T.N.D., Yeo C.K., Detecting colluding blackhole and greyhole attacks in delay tolerant networks, IEEE Trans. Mob. Comput. 15 (5) (2016) 1116–1129.

Cited By

View all
  • (2023)A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)Wireless Personal Communications: An International Journal10.1007/s11277-024-10888-9133:4(2541-2580)Online publication date: 1-Dec-2023
  • (2023)A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANETThe Journal of Supercomputing10.1007/s11227-023-05053-179:9(10481-10504)Online publication date: 8-Feb-2023
  • (2022)Euler Phi Function and Gamma Function Based Elliptic Curve Encryption for Secured Group CommunicationWireless Personal Communications: An International Journal10.1007/s11277-022-09557-6125:1(421-451)Online publication date: 1-Jul-2022
  • Show More Cited By

Index Terms

  1. Cross centric intrusion detection system for secure routing over black hole attacks in MANETs
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Computer Communications
        Computer Communications  Volume 148, Issue C
        Dec 2019
        243 pages

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        Published: 15 December 2019

        Author Tags

        1. Routing
        2. Data blockage
        3. Intrusion detection system
        4. Cross centric network
        5. Priority portion assignment
        6. Past interaction history
        7. Communication overhead
        8. Black hole attack

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 30 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)Wireless Personal Communications: An International Journal10.1007/s11277-024-10888-9133:4(2541-2580)Online publication date: 1-Dec-2023
        • (2023)A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANETThe Journal of Supercomputing10.1007/s11227-023-05053-179:9(10481-10504)Online publication date: 8-Feb-2023
        • (2022)Euler Phi Function and Gamma Function Based Elliptic Curve Encryption for Secured Group CommunicationWireless Personal Communications: An International Journal10.1007/s11277-022-09557-6125:1(421-451)Online publication date: 1-Jul-2022
        • (2022)Geographic routing in mobile ad hoc networks (MANET) using hybrid optimization model: a multi-objective perspectiveApplied Intelligence10.1007/s10489-022-03885-753:9(11214-11228)Online publication date: 2-Sep-2022
        • (2022)A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc networkApplied Intelligence10.1007/s10489-022-03763-253:6(7169-7185)Online publication date: 16-Jul-2022
        • (2022)Modified device key generation algorithm and A* algorithm to optimize the security measures based on trust value in device-to-device communicationsSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-021-06508-426:23(13081-13096)Online publication date: 1-Dec-2022
        • (2021)Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile NetworkWireless Personal Communications: An International Journal10.1007/s11277-021-08426-y119:4(3673-3697)Online publication date: 1-Aug-2021
        • (2021)Mobility Aware Quality Enhanced Cluster Based Routing Protocol for Mobile Ad-Hoc Networks Using Hybrid Optimization AlgorithmWireless Personal Communications: An International Journal10.1007/s11277-021-08387-2119:4(3063-3087)Online publication date: 10-Apr-2021

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media