Skip to main content
Erschienen in: Wireless Networks 7/2019

30.01.2019

Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule

verfasst von: Neenavath Veeraiah, B. Tirumala Krishna

Erschienen in: Wireless Networks | Ausgabe 7/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security issues in the network and most of the Intrusion detection methods concentrated on the energy dissipation and obtained better results, whereas the trust remained a hectic factor. This paper proposes a trust-aware scheme to detect the intrusion in the MANET. The proposed Trust-aware fuzzy clustering and fuzzy Naive Bayes (trust-aware FuzzyClus-Fuzzy NB) method of detecting the intrusion is found to be effective. The fuzzy clustering concept determines the cluster-head to form the clusters. The proposed BDE-based trust factors along with the direct trust, indirect trust, and the recent trust, hold the information of the nodes and the fuzzy Naive Bayes determine the intrusion in the nodes using the node trust table. The simulation results convey the effectiveness of the proposed method and the proposed method is analyzed based on the metrics, such as delay, energy, detection rate, and throughput. The delay is in minimum at a rate of 0.00434, with low energy dissipation of 9.933, high detection rate of 0.623, and greater throughput of 0.642.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kuo, W.-K., & Chu, S.-H. (2016). Energy efficiency optimization for mobile ad hoc networks. IEEE Access, 4, 928–940.CrossRef Kuo, W.-K., & Chu, S.-H. (2016). Energy efficiency optimization for mobile ad hoc networks. IEEE Access, 4, 928–940.CrossRef
2.
Zurück zum Zitat El Khawaga, S. E., Saleh, A. I., & Ali, H. A. (2016). An administrative cluster-based cooperative caching (ACCC) strategy for mobile ad hoc networks. Journal of Network and Computer Applications, 69, 54–76.CrossRef El Khawaga, S. E., Saleh, A. I., & Ali, H. A. (2016). An administrative cluster-based cooperative caching (ACCC) strategy for mobile ad hoc networks. Journal of Network and Computer Applications, 69, 54–76.CrossRef
3.
Zurück zum Zitat Kuppusamy, P., & Kalaavathi, B. (2012). Cluster-based data consistency for cooperative caching over partitionable mobile adhoc network. American Journal of Applied Sciences, 9(8), 1307–1315.CrossRef Kuppusamy, P., & Kalaavathi, B. (2012). Cluster-based data consistency for cooperative caching over partitionable mobile adhoc network. American Journal of Applied Sciences, 9(8), 1307–1315.CrossRef
4.
Zurück zum Zitat Marchang, N., Datta, R., & Das, S. K. (2017). A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 66(2), 1684–1695.CrossRef Marchang, N., Datta, R., & Das, S. K. (2017). A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 66(2), 1684–1695.CrossRef
5.
Zurück zum Zitat Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2017). Ensuring survivability against black hole attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 1–23. Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2017). Ensuring survivability against black hole attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 1–23.
6.
Zurück zum Zitat Tseng, C. (2006). Distributed intrusion detection models for mobile ad hoc networks. Ph.D. thesis, University of California Davis. Tseng, C. (2006). Distributed intrusion detection models for mobile ad hoc networks. Ph.D. thesis, University of California Davis.
7.
Zurück zum Zitat Umamaheswari, S., & Radhamani, G. (2015). Enhanced ANTSEC framework with cluster-based cooperative caching in mobile ad hoc networks. Journal of Communications and Networks, 17(1), 40–46.CrossRef Umamaheswari, S., & Radhamani, G. (2015). Enhanced ANTSEC framework with cluster-based cooperative caching in mobile ad hoc networks. Journal of Communications and Networks, 17(1), 40–46.CrossRef
8.
Zurück zum Zitat Singh, O., Singh, J., & Singh, R. (2018). Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Computing, 21(1), 51–63. Singh, O., Singh, J., & Singh, R. (2018). Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Computing, 21(1), 51–63.
9.
Zurück zum Zitat Narayandas, V., Tiruvayipati, S., Hanmandlu, M., & Thimmareddy, L. (2017). Anomaly detection system in a cluster-based MANET. In Proceedings in computer communication, networking and internet security (pp. 11–21). Singapore: Springer. Narayandas, V., Tiruvayipati, S., Hanmandlu, M., & Thimmareddy, L. (2017). Anomaly detection system in a cluster-based MANET. In Proceedings in computer communication, networking and internet security (pp. 11–21). Singapore: Springer.
10.
Zurück zum Zitat Feng, D., Jiang, C., Lim, G., Cimini, L. J., Jr., Feng, G., & Li, G. Y. (2013). A survey of energy-efficient wireless communications. IEEE Communications Surveys and Tutorials, 15(1), 167–178.CrossRef Feng, D., Jiang, C., Lim, G., Cimini, L. J., Jr., Feng, G., & Li, G. Y. (2013). A survey of energy-efficient wireless communications. IEEE Communications Surveys and Tutorials, 15(1), 167–178.CrossRef
11.
Zurück zum Zitat Usha, G., Rajesh Babu, M., & Saravana Kumar, S. (2017). Dynamic anomaly detection using cross-layer security in MANET. Computers and Electrical Engineering, 59, 231–241.CrossRef Usha, G., Rajesh Babu, M., & Saravana Kumar, S. (2017). Dynamic anomaly detection using cross-layer security in MANET. Computers and Electrical Engineering, 59, 231–241.CrossRef
12.
Zurück zum Zitat Arthur, M. P., & Kannan, K. (2016). Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wireless Networks, 22(3), 1035–1059.CrossRef Arthur, M. P., & Kannan, K. (2016). Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wireless Networks, 22(3), 1035–1059.CrossRef
13.
Zurück zum Zitat Shams, E. A., & Rizaner, A. (2018). A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wireless Networks, 24(5), 1821–1829.CrossRef Shams, E. A., & Rizaner, A. (2018). A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wireless Networks, 24(5), 1821–1829.CrossRef
14.
Zurück zum Zitat Kumarasamy, S., Hemalatha, B., & Hashini, P. (2013). Cluster-based cost efficient intrusion detection system for MANET. In Proceedings in arXiv preprint arXiv:1311.1446 (pp. 1–9). Kumarasamy, S., Hemalatha, B., & Hashini, P. (2013). Cluster-based cost efficient intrusion detection system for MANET. In Proceedings in arXiv preprint arXiv:​1311.​1446 (pp. 1–9).
15.
Zurück zum Zitat Gerla, M., Kwon, T., & Pei, G. (2000). On demand routing in large ad hoc wireless networks with passive clustering. In Proceedings in IEEE wireless communications and networking conference (WCNC). Gerla, M., Kwon, T., & Pei, G. (2000). On demand routing in large ad hoc wireless networks with passive clustering. In Proceedings in IEEE wireless communications and networking conference (WCNC).
16.
Zurück zum Zitat Perkins, C. E. (1997). Mobile ad hoc networking terminology. Internet draft, from draft-IETF-manet-term-00.txt. Perkins, C. E. (1997). Mobile ad hoc networking terminology. Internet draft, from draft-IETF-manet-term-00.txt.
17.
Zurück zum Zitat Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153–181.CrossRef Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153–181.CrossRef
18.
Zurück zum Zitat Ratnasamy, S., Karp, B., Shenker, S., Estrin, D., Govindan, R., Yin, L., et al. (2003). Data-centric storage in sensornets with GHT, a geographic Hash table. Mobile Networks and Applications, 8(4), 427–442.CrossRef Ratnasamy, S., Karp, B., Shenker, S., Estrin, D., Govindan, R., Yin, L., et al. (2003). Data-centric storage in sensornets with GHT, a geographic Hash table. Mobile Networks and Applications, 8(4), 427–442.CrossRef
19.
Zurück zum Zitat Jiang, M., Ti, J., & Tay, Y. (1999). Cluster based routing protocol. Internet draft, from draft-IETF-manet-cbrpspec-01.txt. Jiang, M., Ti, J., & Tay, Y. (1999). Cluster based routing protocol. Internet draft, from draft-IETF-manet-cbrpspec-01.txt.
20.
Zurück zum Zitat Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad hoc networks. Ad Hoc Networks, 66, 95–109.CrossRef Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad hoc networks. Ad Hoc Networks, 66, 95–109.CrossRef
21.
Zurück zum Zitat Sivakumar, R., Sinha, P., & Bharghavan, V. (1999). CEDAR: A core-extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications, 17(8), 1454–1465.CrossRef Sivakumar, R., Sinha, P., & Bharghavan, V. (1999). CEDAR: A core-extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications, 17(8), 1454–1465.CrossRef
22.
Zurück zum Zitat Denning, D. E. (1987). An intrusion detection model. IEEE Transactions on Software Engineering, 13(2), 222–232.CrossRef Denning, D. E. (1987). An intrusion detection model. IEEE Transactions on Software Engineering, 13(2), 222–232.CrossRef
23.
Zurück zum Zitat Anjum, F., Subhadrabandhu, D., & Sarkar, S. (2003). Signature-based intrusion detection for wireless ad hoc networks. In Proceedings in VTC (Vol. 3, pp. 2152–2156), USA. Anjum, F., Subhadrabandhu, D., & Sarkar, S. (2003). Signature-based intrusion detection for wireless ad hoc networks. In Proceedings in VTC (Vol. 3, pp. 2152–2156), USA.
24.
Zurück zum Zitat Subba, B., Biswas, S., & Karmakar, S. (2016). Intrusion detection in Mobile Ad hoc Networks: Bayesian game formulation. Engineering Science and Technology, an International Journal, 19(2), 782–799.CrossRef Subba, B., Biswas, S., & Karmakar, S. (2016). Intrusion detection in Mobile Ad hoc Networks: Bayesian game formulation. Engineering Science and Technology, an International Journal, 19(2), 782–799.CrossRef
25.
Zurück zum Zitat Li, J., Lewis, H. W. (2016). Fuzzy clustering algorithms—review of the applications. In Proceedings of the IEEE international conference on smart cloud (SmartCloud) (pp. 282–288). Li, J., Lewis, H. W. (2016). Fuzzy clustering algorithms—review of the applications. In Proceedings of the IEEE international conference on smart cloud (SmartCloud) (pp. 282–288).
26.
Zurück zum Zitat Störr, H. H. P., Xu, Y., & Choi, J. (2002). A compact fuzzy extension of the Naive Bayesian classification algorithm. In Proceedings of InTech/VJFuzzy. Störr, H. H. P., Xu, Y., & Choi, J. (2002). A compact fuzzy extension of the Naive Bayesian classification algorithm. In Proceedings of InTech/VJFuzzy.
Metadaten
Titel
Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
verfasst von
Neenavath Veeraiah
B. Tirumala Krishna
Publikationsdatum
30.01.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-01933-0

Weitere Artikel der Ausgabe 7/2019

Wireless Networks 7/2019 Zur Ausgabe

Neuer Inhalt