Skip to main content

2019 | OriginalPaper | Buchkapitel

A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the past decade, mobile ad-hoc networks (MANET) gained the attention of researchers and became a key technology in many aspects owing to its potential applicability and increased usage in providing efficient wireless networking. The ability of enabling an instant temporary wireless networking scenario in situations like flooding and defense made MANET a prominent domain of research. Although, it has been extensively studied with respect to different means of issues including network security, power consumption issues etc. but the core findings in the area of security were found mostly limited to theoretical contributions. Moreover, An intrusion detection systems (IDS) enable different procedures involved into monitoring the activities being exercised in a MANET whether; it poses any suspicious or malicious events that could be harmful for the entire system. The conventional IDS models are more likely to consume higher level of energy which minimizes the network lifetime owing to rapid depletion of node’s battery power. The study thereby primarily addressed this issue and come up with an efficient scheme which targets to optimize the time period in which IDS remain busy in a large-scale MANET. It also incorporated a technique which relates probabilistic theory of optimization to bring an effective cooperation among IDSs and neighbor nodes which leads to reduce their individual busy time. The proposed approach aims to reduce busy time of individual IDS while maintaining their effectiveness towards achieving defined tasks. To support the performance efficiency the proposed study developed an algorithm and simulated it over a numerical computing tool in terms of different performance parameters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217–241 (2012)CrossRef Zeadally, S., Hunt, R., Chen, Y.-S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 217–241 (2012)CrossRef
2.
Zurück zum Zitat Bhoi, S.K., Khilar, P.M.: Vehicular communication: a survey. IET Netw. 3(3), 204–217 (2014)CrossRef Bhoi, S.K., Khilar, P.M.: Vehicular communication: a survey. IET Netw. 3(3), 204–217 (2014)CrossRef
3.
Zurück zum Zitat Marti, S., Giuli, T.J., La, K., Baker, M.: Mitigating routing misbehavior in a mobile ad-hoc environment. In: Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265, August 2000 Marti, S., Giuli, T.J., La, K., Baker, M.: Mitigating routing misbehavior in a mobile ad-hoc environment. In: Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265, August 2000
4.
Zurück zum Zitat Bernsen, J., Manivannan, D.: Unicast routing protocols for vehicular ad hoc networks: a critical comparison and classification. Pervasive Mob. Comput. 5(1), 1–18 (2009)CrossRef Bernsen, J., Manivannan, D.: Unicast routing protocols for vehicular ad hoc networks: a critical comparison and classification. Pervasive Mob. Comput. 5(1), 1–18 (2009)CrossRef
5.
Zurück zum Zitat Kumar, R., Dave, M.: A comparative study of various routing protocols in VANET, CoRR, vol. abs/1108.2094 (2011) Kumar, R., Dave, M.: A comparative study of various routing protocols in VANET, CoRR, vol. abs/1108.2094 (2011)
6.
Zurück zum Zitat Zhang, M., Wolff, R.S.: A border node based routing protocol for partially connected vehicular ad hoc networks. J. Commun. 5(2), 130–143 (2010)CrossRef Zhang, M., Wolff, R.S.: A border node based routing protocol for partially connected vehicular ad hoc networks. J. Commun. 5(2), 130–143 (2010)CrossRef
7.
Zurück zum Zitat Hoang Hai, T., Huh, E.-N.: Optimal selection and activation of intrusion detection agents for wireless sensor networks. In: Proceedings of the Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 350–355, 6–8 December 2007 Hoang Hai, T., Huh, E.-N.: Optimal selection and activation of intrusion detection agents for wireless sensor networks. In: Proceedings of the Future Generation Communication and Networking (FGCN 2007), vol. 1, pp. 350–355, 6–8 December 2007
8.
Zurück zum Zitat Fitaci, S.M., Jaffres-Runser, K., Comaniciu, C.: On modeling energy-security trade-offs for distributed monitoring in wireless ad hoc networks. In: Proceedings of the Military Communications Conference, MILCOM 2008, pp. 1–7. IEEE, 16–19 November 2008 Fitaci, S.M., Jaffres-Runser, K., Comaniciu, C.: On modeling energy-security trade-offs for distributed monitoring in wireless ad hoc networks. In: Proceedings of the Military Communications Conference, MILCOM 2008, pp. 1–7. IEEE, 16–19 November 2008
9.
Zurück zum Zitat Clegg, R.G., Clayman, S., Pavlou, G., Mamatas, L., Galis, A.: On the selection of management/monitoring nodes in highly dynamic networks. IEEE Trans. Comput. 62(6), 1207–1220 (2013)MathSciNetCrossRefMATH Clegg, R.G., Clayman, S., Pavlou, G., Mamatas, L., Galis, A.: On the selection of management/monitoring nodes in highly dynamic networks. IEEE Trans. Comput. 62(6), 1207–1220 (2013)MathSciNetCrossRefMATH
10.
Zurück zum Zitat Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514–527 (2011)CrossRef Dong, D., Liao, X., Liu, Y., Shen, C., Wang, X.: Edge self-monitoring for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 514–527 (2011)CrossRef
11.
Zurück zum Zitat Khalil, I., Bagchi, S., Shroff, N.B.: SLAM: sleep-wake aware local monitoring in sensor networks. In: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 565–574 (2007) Khalil, I., Bagchi, S., Shroff, N.B.: SLAM: sleep-wake aware local monitoring in sensor networks. In: Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 565–574 (2007)
12.
Zurück zum Zitat Zheng, R., Le, T., Han, Z.: Approximate online learning algorithms for optimal monitoring in multi-channel wireless networks. IEEE Trans. Wirel. Commun. 13(2), 1023–1033 (2014)CrossRef Zheng, R., Le, T., Han, Z.: Approximate online learning algorithms for optimal monitoring in multi-channel wireless networks. IEEE Trans. Wirel. Commun. 13(2), 1023–1033 (2014)CrossRef
13.
Zurück zum Zitat Tsikoudis, N., Papadogiannakis, A., Markatos, E.P.: LEoNIDS: a low-latency and energy-efficient network-level intrusion detection system. IEEE Trans. Emerg. Top. Comput. PP(99) (2014) Tsikoudis, N., Papadogiannakis, A., Markatos, E.P.: LEoNIDS: a low-latency and energy-efficient network-level intrusion detection system. IEEE Trans. Emerg. Top. Comput. PP(99) (2014)
14.
Zurück zum Zitat Muradore, R., Quaglia, D.: Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans. Ind. Inform. 11(3), 830–840 (2015)CrossRef Muradore, R., Quaglia, D.: Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans. Ind. Inform. 11(3), 830–840 (2015)CrossRef
15.
Zurück zum Zitat Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: Proceedings of the 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 4510–4513, 8–10 August 2011 Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: Proceedings of the 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), pp. 4510–4513, 8–10 August 2011
16.
Zurück zum Zitat Afgah, A., Das, S.K., Basu, K.: A non-cooperative game approach for intrusion detection in sensor networks. In: Proceedings of the VTC 2004, Fall 2004 Afgah, A., Das, S.K., Basu, K.: A non-cooperative game approach for intrusion detection in sensor networks. In: Proceedings of the VTC 2004, Fall 2004
17.
Zurück zum Zitat Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004 Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 43rd IEEE Conference on Decision and Control, December 2004
18.
Zurück zum Zitat Liu, Y., Man, H., Comaniciu, C.: A game theoretic approach to efficient mixed strategies for intrusion detection. In: Proceedings of the IEEE International Conference on Communications (ICC 2006) (2006) Liu, Y., Man, H., Comaniciu, C.: A game theoretic approach to efficient mixed strategies for intrusion detection. In: Proceedings of the IEEE International Conference on Communications (ICC 2006) (2006)
Metadaten
Titel
A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET
verfasst von
Najiya Sultana
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-91192-2_38