Reduction of Malicious Nodes using RRT and Clustering in Mobile Ad hoc Network

Authors

  • Zulfekar Ahmad  Computer Science and Engineering, Vedica Institute of Technology, Bhopal, Madhya Pradesh, India
  • Akhilesh Bansiya  Computer Science and Engineering, Vedica Institute of Technology, Bhopal, Madhya Pradesh, India

Keywords:

MANET, IDS, RREQ, RTT, RREP, fuzzy logic , Large Mobile Host, DBMS

Abstract

Mobile Ad-hoc Network is a collection of wireless mobile node, consists of each wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node.IDS can be well-defined as the protector system which self-detects malicious activities within a network, and thus generates an alarm to alert the security device at a locality if intrusions are considered to be illegal on that network or host. There me many approach to classify IDS.In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network.

References

  1. Aarti, Dr. S. S. Tyagi "Study of MANET: Characteristics, Challenges, Application and Security Attacks" Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
  2. Md. MahbubulAlam, And TanmoonTazShetu, "A Report submitted to sadiahamidkazi of computer science and engineering department of brac university in fulfillment of the requirements for thesis work" April – 2011.
  3. AikateriniMitrokotsa, Christos Dimitrakakis, ―Intrusion detection in MANET using classification algorithms: The effects of cost and model selection‖, Ad Hoc Networks, Volume 11, Issue 1, January 2013, Pages 226-237.
  4. Gruenwald, L., Javed, M., and Gu, M. Energy- Efficient Data Broadcasting in Mobile Ad-Hoc Networks. In Proc. International Database Engineering and Applications Symposium (IDEAS '02), July, 2002.
  5. Lee, S., Su, W., and Gerla, M., "Wireless Ad Hoc Multicast Routing with Mobility Prediction," Mobile Networks and Applications, 6(4): pp. 351-360, 2001.
  6. Liu, J., Zhang, Q., Li, B., Zhu, W., and Zhang, J., "A Unified Framework for Resource Discovery and QoS-Aware Provider Selection in Ad Hoc Networks," ACM Mobile Computing and Communications Review, 6(1): pp. 13-21, 2002.
  7. Singh, S., Woo, M., and Raghavendra, C. Power Aware Routing in Mobile Ad Hoc Networks. In Proc. 4th International Conf. on Mobile Computing and Networking (MOBICOM '98), pp. 181-190, October, 1998.
  8. Mrs.Padma .P, Mr.R.Suresh "Literature Survey on latest research issues in MANET" ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013.
  9. KetanNadkarni "An Intrusion Detection Scheme for Wireless Mobile Ad hoc Networks based on DSDV Protocol" August 29, 2003.
  10. Ms. ApurvaKulkarni, Mr.PrashantRewagad ,Mr.MayurAgrawal "Literature Survey on IDS of MANET" International Journal of scientific research and management (IJSRM) ||Volume||3||Issue||9||Pages|| 3549-3552||2015||.
  11. Ranjit j. Bhosale, Prof. R.K.Ambekar "A Survey on Intrusion detection System for Mobile Ad-hoc Networks" Ranjit j. Bhosale et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7330-7333.
  12. A Survey on MANET Intrusion Detection: Satria Mandala [email protected] Faculty of Science and Technology, Department of Informatics Engineering, State Islamic University of Malang Jl. Gajayana 50 Malang, Indonesia, Md. AsriNgadi [email protected] Faculty of Computer Science and Information System, Department of Computer System and Communication, UniversitiTeknologi Malaysia (UTM) Skudai - Johor, 81310, Malaysia.
  13. Y. Zhang, W. Lee and Y. Huang. 2003. Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM WINET). 9(5).
  14. A. Hijazi and N. Nasser. 2005. Using Mobile Agents for Intrusion Detection in Wireless Ad Hoc Networks. In Wireless and Optical Communications Networks (WOCN).
  15. T. F. Lunt and R. Jagannathan, et al. 1988. IDES: The Enhanced Prototype C a Realtime Intrusion- Detection Expert System. Technical Report SRI-CSL-88-12, SRI International, Menlo Park, CA.
  16. M. Esposito and C. Mazzariello, et al. 2005. Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. The 7th International Workshop on Pattern Recognition in Information Systems. pp. 144-153.
  17. S. Kumar and E. Spafford. 1994. A Pattern Matching Model for Misuse Intrusion Detection. The 17th National Computer Security Conference. pp. 11-21.
  18. P.A. Porras and R. Kemmerer. 1992. Penetration State Transition Analysis C a Rule-Based Intrusion Detection Approach. The 8th Annual Computer Security Application Conference. pp. 220-229.
  19. W. Lee, S.J. Stolfo and K.W. Mok. 1999. A Data Mining Framework for Building Intrusion Detection Models. IEEE Symposium on Security and Privacy. Oakland, California.
  20. G. Florez, S.M. Bridges and R.B. Vaughn. 2002. An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection. The North American Fuzzy Information Processing Society Conference, New Orleans, LA.
  21. N. Ye and X. Li, et al. 2001. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. IEEE Transactions on Systems, Man, and Cybernetics. pp. 266-274.
  22. H. Debar, M. Dacier and A. Wespi. 2000. A Revised Taxonomy for Intrusion-Detection Systems. Annales des Telecommunications. pp. 361-378.
  23. C. Ko, J. Rowe, P. Brutch and K. Levitt. 2001. System Health and Intrusion Monitoring Using a hierarchy of Constraints. In: Proceedings of 4th International Symposium, RAID.
  24. Intrusion Detection in Wireless Ad-Hoc Networks: FoongHengWai [email protected]> Yin Nwe Aye Ng Hian James [email protected]: CS4274 INTRODUCTION TO MOBILE COMPUTING.
  25. Sundaram A. An introduction to Intrusion detection, http://www.acm.org/crossroads/xrds2-4/intrus.html.

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
Zulfekar Ahmad, Akhilesh Bansiya, " Reduction of Malicious Nodes using RRT and Clustering in Mobile Ad hoc Network , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.133-142, November-December-2018.