Cross centric intrusion detection system for secure routing over black hole attacks in MANETs

被引:18
|
作者
Rajendran, N. [1 ]
Jawahar, P. K. [2 ]
Priyadarshini, R. [1 ]
机构
[1] BS Abdur Rahman Crescent Inst Sci & Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
[2] BS Abdur Rahman Crescent Inst Sci & Technol, Dept EIE, Chennai, Tamil Nadu, India
关键词
Routing; Data blockage; Intrusion detection system; Cross centric network; Priority portion assignment; Past interaction history; Communication overhead; Black hole attack; ALGORITHM;
D O I
10.1016/j.comcom.2019.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the constraint of resources in Mobile Adhoc Network (MANET), usually mobile nodes do not gain perfect routing efficiency. This routing efficiency will be reduced by several numbers of data blockages and the communication time in the routing path. There are many data blockages arising, especially Black Hole Attack (BHA) is a massive anomalous attack in routing. This may cause the efficiency of communication time between nodes. In this juncture, the availability of Intrusion Detection System with Cross centric network which is overloaded with routing path packets, so it is easily affected by the BHA. To decrease the impact of black hole attack using Cross Centric Network Intrusion Detection System, this research proposes the CniDsor framework. CniDsor framework is a diminutive form of the "Cross Centric Intrusion Detection System for Secure Routing over Black Hole Attacks in MANETs". This system is used to prevent the Black Hole Attacks over the Secure Routing. CniDsor works based on the Path Origin Selection, Priority Portion Assignment (PPA) and IDS attack reduction. In this study, path origin selection utilizes secure routing by "PIHNSPRA Routing Algorithm" and it selects the path from end to end nodes with secure manner and reduces the black-hole attack. Meanwhile, priority portion assignment is used to manage the node position and network monitoring by the "Past Interaction History". Finally, CniDsor framework provides secure IDS communication efficiency in MANET which is used to accomplish the efficient routing path. Moreover, the proposed CniDsor framework works better and minimizes the communication overhead, packet delay and end to end delay, thus increases the network lifetime, packet delivery ratio (PDR).
引用
收藏
页码:129 / 135
页数:7
相关论文
共 50 条
  • [1] Makespan of routing and security in Cross Centric Intrusion Detection System (CCIDS) over black hole attacks and rushing attacks in MANET
    Rajendran, N.
    Jawahar, P. K.
    Priyadarshini, R.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2019, 7 (04) : 162 - 176
  • [2] A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs
    Padmanabhan, Jayashree
    Subramaniam, Tamil Selvan Raman
    Prakasam, Kumaresh
    Ponpandiyan, Vigneswaran
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 541 - 548
  • [3] Intrusion Detection for Black Hole and Gray Hole in MANETs
    She, Chundong
    Yi, Ping
    Wang, Junfeng
    Yang, Hongshen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (07): : 1721 - 1736
  • [4] A Secure Intrusion Detection System for MANETs
    Annarasi, R. Sakila
    Sivanesh, S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1174 - 1178
  • [5] Preventing Black Hole Attacks in MANETs Using Secure Knowledge Algorithm
    Siddiqua, Ayesha
    Sridevi, Kotari
    Mohammed, Arshad Ahmad Khan
    [J]. 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 421 - 425
  • [6] Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs
    Arulselvan, G.
    Rajaram, A.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (04) : 6575 - 6590
  • [7] A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs
    Zardari, Zulfigar Ali
    He, Jingsha
    Zhu, Nafei
    Mohammadani, Khalid Hussain
    Pathan, Muhammad Salman
    Hussain, Muhammad Iftikhar
    Memon, Muhammad Qasim
    [J]. FUTURE INTERNET, 2019, 11 (03):
  • [8] EAACK- A Secure Intrusion Detection and Prevention System for MANETs
    Joshi, Poonam
    Nande, Pooja
    Pawar, Ashwini
    Shinde, Pooja
    Umbare, Rupali
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [9] Hierarchical Energy Efficient Intrusion Detection System for Black Hole Attacks in WSNs
    Athmani, Samir
    Boubiche, Djallel Eddine
    Bilami, Azeddine
    [J]. WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [10] EAACK-A Secure Intrusion-Detection System for MANETs
    Shakshuki, Elhadi M.
    Kang, Nan
    Sheltami, Tarek R.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2013, 60 (03) : 1089 - 1098