A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks

被引:2
|
作者
Chugh, Neeraj [1 ,2 ]
Tomar, Geetam Singh [3 ]
Bhadoria, Robin Singh [4 ]
Saxena, Neetesh [5 ]
机构
[1] Univ Petr & Energy Studies Dehradun, Sch Comp Sci, Dept Syst, Dehra Dun 248001, Uttarakhand, India
[2] Uttarakhand Tech Univ, Fac Comp Sci & Engn, Dehra Dun 248001, Uttarakhand, India
[3] Rajkiya Engn Coll REC, Sonbhadra 231206, Uttar Pradesh, India
[4] Birla Inst Appl Sci BIAS Bhimtal, Dept Comp Sci & Engn, Naini Tal 263136, Uttarakhand, India
[5] Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF24 3AA, Wales
关键词
Mobile Ad Hoc Networks (MANETs); anomaly detection; anomaly behavior detection; security; energy preservation; OUTLIER DETECTION; WIRELESS; ALGORITHMS; MANETS;
D O I
10.3390/electronics10141635
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performance for DD-ZRP over existing schemes; the method is substantially better than the prevailing protocols with respect to anomaly detection for security enhancement, energy efficiency, and optimization of available resources.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Routing anomaly detection in mobile ad hoc networks
    Sun, B
    Wu, K
    Pooch, UW
    [J]. ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 25 - 31
  • [2] A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks
    Nakayama, Hidehisa
    Kurosawa, Satoshi
    Jamalipour, Abbas
    Nemoto, Yoshiaki
    Kato, Nei
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (05) : 2471 - 2481
  • [3] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [4] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Tameem Eissa
    Shukor Abd Razak
    Mohd Asri Ngadi
    [J]. Arabian Journal for Science and Engineering, 2012, 37 : 2179 - 2192
  • [5] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
  • [6] A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks
    Gao Xiaopeng
    Chen Wei
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 209 - 214
  • [7] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Eissa, Tameem
    Abd Razak, Shukor
    Ngadi, Mohd Asri
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2012, 37 (08) : 2179 - 2192
  • [8] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    [J]. DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542
  • [9] A novel multiple routes discovery scheme for mobile ad hoc networks
    Xie, Fang
    Du, Lei
    Bai, Yong
    Chen, Lan
    [J]. 2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 288 - 292
  • [10] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639