Skip to main content
Erschienen in: Wireless Networks 2/2019

19.10.2017

GUARD: an intrusion detection framework for routing protocols in multi-hop wireless networks

verfasst von: T. K. Thivakaran, T. Sakthivel

Erschienen in: Wireless Networks | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Multihop Wireless Networks have received great attention in recent years, owing to the rapid proliferation of wireless devices. The wireless routing protocols assume that the nodes are cooperating and well-behaving. However, such networks are subject to several active routing attacks such as dropping, flooding, and modification. The primary intention of such attack is to thwart the objectives of routing protocols and cause network malfunction. This state of affairs motivates the recent research towards the development of a sophisticated security framework that works well against active routing attacks. This paper proposes GUARD, an intrusion detection framework that aims at detecting the active routing attacks efficiently with a considerable reduction in energy consumption. The GUARD incorporates three mechanisms such as a Restricted Directional Watchdog Selection, a Game Design, and an Incentive Estimation. Applying the Restricted Directional Watchdog Selection makes the GUARD a lightweight intrusion detection system (IDS) model, where only a limited number of nodes turn on IDS. The GUARD utilizes non-cooperative game design and exploits the advantage of Fuzzy q-learning to determine the malicious activity. The notion of Fuzzy q-learning determines the results of the player strategies of game design to measure the appropriate reward. The GUARD framework is incorporated into the popular protocols such as AODV and LEACH to validate the effectiveness of the defense mechanism. The simulation results show that these extended protocols outperform the existing protocols in terms of attack detection accuracy, throughput, delay, and network lifetime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security (pp. 103–135). New York: Springer. doi:10.1007/978-0-387-33112-6_5. Wu, B., Chen, J., Wu, J., Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security (pp. 103–135). New York: Springer. doi:10.​1007/​978-0-387-33112-6_​5.
2.
Zurück zum Zitat Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of Supercomputing, 68(1), 1–48. doi:10.1007/s11227-013-1021-9.CrossRef Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of Supercomputing, 68(1), 1–48. doi:10.​1007/​s11227-013-1021-9.CrossRef
3.
Zurück zum Zitat Ahmed, A., Bakar, K. A., Channa, M. I., & Khan, A. W. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285. doi:10.1007/s11036-016-0683-y.CrossRef Ahmed, A., Bakar, K. A., Channa, M. I., & Khan, A. W. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285. doi:10.​1007/​s11036-016-0683-y.CrossRef
5.
Zurück zum Zitat Ghosal, A., & Halder, S. (2013). Intrusion detection in wireless sensor networks: Issues, challenges and approaches. In Wireless networks and security (pp. 329–367). New York: Springer. doi:10.1007/978-3-642-36169-2_10. Ghosal, A., & Halder, S. (2013). Intrusion detection in wireless sensor networks: Issues, challenges and approaches. In Wireless networks and security (pp. 329–367). New York: Springer. doi:10.​1007/​978-3-642-36169-2_​10.
7.
Zurück zum Zitat Felegyhazi, M., & Hubaux, J.-P. (2006). Game theory in wireless networks: A tutorial. EPFL Technical report: LCA-REPORT-2006-002. Felegyhazi, M., & Hubaux, J.-P. (2006). Game theory in wireless networks: A tutorial. EPFL Technical report: LCA-REPORT-2006-002.
8.
Zurück zum Zitat Paramasivan, B., & Pitchai, K. M. (2011). Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks. International Journal of Computer Applications, NSC (5), pp. 24–29, doi:10.5120/4354-055. Paramasivan, B., & Pitchai, K. M. (2011). Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks. International Journal of Computer Applications, NSC (5), pp. 24–29, doi:10.​5120/​4354-055.
10.
11.
Zurück zum Zitat Agah, A., Das, S. K., Basu, K., & Asadi, M. (2004). Intrusion detection in sensor networks: A non-cooperative game approach. In Proceedings of third IEEE international symposium in network computing and applications (pp. 343–346). doi:10.1109/NCA.2004.1347798. Agah, A., Das, S. K., Basu, K., & Asadi, M. (2004). Intrusion detection in sensor networks: A non-cooperative game approach. In Proceedings of third IEEE international symposium in network computing and applications (pp. 343–346). doi:10.​1109/​NCA.​2004.​1347798.
13.
Zurück zum Zitat Panaousis, E. A., & Politis, C. (2011). Non-cooperative games between legitimate nodes and malicious coalitions in MANETs. In Conference proceedings of future network and mobile summit. ISBN: 978-1-905824-23-6. Panaousis, E. A., & Politis, C. (2011). Non-cooperative games between legitimate nodes and malicious coalitions in MANETs. In Conference proceedings of future network and mobile summit. ISBN: 978-1-905824-23-6.
14.
Zurück zum Zitat Li, F., Yang, Y., & Wu, J. (2010). Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man, and Cybernetics Part B, 40(3), 612–622. doi:10.1109/TSMCB.2009.2035929.CrossRef Li, F., Yang, Y., & Wu, J. (2010). Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man, and Cybernetics Part B, 40(3), 612–622. doi:10.​1109/​TSMCB.​2009.​2035929.CrossRef
15.
Zurück zum Zitat Liu, Y., Comaniciu, C., & Man, H. (2006). A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the workshop on game theory for communications and networks, ACM, doi:10.1145/1190195.1190198. Liu, Y., Comaniciu, C., & Man, H. (2006). A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the workshop on game theory for communications and networks, ACM, doi:10.​1145/​1190195.​1190198.
16.
Zurück zum Zitat Patcha, A., & Park, J.-M. (2006). A game theoretic formulation for intrusion detection in mobile ad hoc network. International Journal of Network Security, 2(2), 131–137. Patcha, A., & Park, J.-M. (2006). A game theoretic formulation for intrusion detection in mobile ad hoc network. International Journal of Network Security, 2(2), 131–137.
17.
Zurück zum Zitat Liu, Y., Comaniciu, C., & Man, H. (2006). Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks, 1(3), 243–254. doi:10.1504/IJSN.2006.011784.CrossRef Liu, Y., Comaniciu, C., & Man, H. (2006). Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks, 1(3), 243–254. doi:10.​1504/​IJSN.​2006.​011784.CrossRef
19.
20.
Zurück zum Zitat Gomez, J., & Dasgupta, D. (2002). Evolving fuzzy classifiers for intrusion detection. Proceedings of the IEEE Workshop on Information Assurance, 6(3), 321–323. Gomez, J., & Dasgupta, D. (2002). Evolving fuzzy classifiers for intrusion detection. Proceedings of the IEEE Workshop on Information Assurance, 6(3), 321–323.
21.
Zurück zum Zitat Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence, 32, 228–241. doi:10.1016/j.engappai.2014.02.001.CrossRef Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence, 32, 228–241. doi:10.​1016/​j.​engappai.​2014.​02.​001.CrossRef
22.
23.
Zurück zum Zitat Ying, B. (2014). CUSUM-based intrusion detection mechanism for wireless sensor networks. Journal of Electrical and Computer Engineering. doi:10.1155/2014/245938. Ying, B. (2014). CUSUM-based intrusion detection mechanism for wireless sensor networks. Journal of Electrical and Computer Engineering. doi:10.​1155/​2014/​245938.
24.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. RFC 3561. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. RFC 3561.
25.
Zurück zum Zitat Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii international conference on system sciences. doi:10.1109/HICSS.2000.926982. Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the Hawaii international conference on system sciences. doi:10.​1109/​HICSS.​2000.​926982.
Metadaten
Titel
GUARD: an intrusion detection framework for routing protocols in multi-hop wireless networks
verfasst von
T. K. Thivakaran
T. Sakthivel
Publikationsdatum
19.10.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1594-y

Weitere Artikel der Ausgabe 2/2019

Wireless Networks 2/2019 Zur Ausgabe

Neuer Inhalt