Ranking Based Security Scheme with Attack Detection and Improved Network Security
Keywords:
MANET, Anomaly Score, Ranking, Attacks, network securityAbstract
: In the diverse environment anomaly detection significant challenge for the efficient analysis of the data traffic monitoring, medical domain, transaction of financial data, web log, domain for transportation, wireless mobile network and so on. Wireless network comprises of the different factors such as ease of use and reduced running cost in the network. MANET network comprises of the infrastructure less, auto configured, dynamic topology and central administration in the network node. This paper concentrated on the examination of the challenges in the MANET attack security challenges and proposed an anomaly detection scheme. The proposed anomaly detection scheme incorporates the scoring procedure for the anomaly detection in the network. The anomaly detection score computes the ranking values in the MANET network for the analysis. The developed ranking-based anomaly detection scheme is defined as the Ranking Anomaly Score (RAS). The performance of the RAS model is evaluated in terms of throughput, Packet delivery rate (PDR) and end -to-end delay. The performance of the proposed RAS model is comparatively examined with the existing Hashing, AODV and RSA. The comparative analysis expressed that proposed RAS model achieves the maximum throughput of 1600 bits/sec, maxima PDR is 98% and end-to-end delay is measured as 14ms. Through analysis it is observed that proposed RAS model achieves improved performance compared with the conventional technique.
Downloads
References
Jim, L. E., Islam, N., & Gregory, M. A. (2022). Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes. Computers & Security, 113, 102538.
Banerjee, B., &Neogy, S. (2021, December). A brief overview of security attacks and protocols in MANET. In 2021 IEEE 18th India Council International Conference (INDICON) (pp. 1-6). IEEE.
Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., &Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEE Access, 9, 120996-121005.
Arappali, N., & Rajendran, G. B. (2021). MANET security routing protocols based on a machine learning technique (Raspberry PIs). Journal of Ambient Intelligence and Humanized Computing, 12(6), 6317-6331.
Kowsigan, M., Rajeshkumar, J., Baranidharan, B., Prasath, N., Nalini, S., & Venkatachalam, K. (2021). A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the MANET. Wireless Personal Communications, 1-21.
Rathish, C. R., Karpagavadivu, K., Sindhuja, P., &Kousalya, A. (2021). A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Information Technology and Control, 50(1), 45-54.
Tu, J., Tian, D., & Wang, Y. (2021). An active-routing authentication scheme in MANET. IEEE Access, 9, 34276-34286.
Simpson, S. V., & Nagarajan, G. (2022). Security challenges and attacks in MANET-IoT systems. In Enterprise Digital Transformation (pp. 159-201). Auerbach Publications.
Sivapriya, N., & Mohandas, R. (2022). Analysis on Essential Challenges and Attacks on MANET Security Appraisal. JOURNAL OF ALGEBRAIC STATISTICS, 13(3), 2578-2589.
Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. Wireless Personal Communications, 121(1), 503-526.
Ponnusamy, M. (2021). Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(9), 2404-2410.
Das, M. V., Premchand, P., & Raju, L. R. (2021). Security Enhancing based on Node Authentication and Trusted Routing in Mobile Ad Hoc Network (MANET). Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(14), 5199-5211.
Ramphull, D., Mungur, A., Armoogum, S., &Pudaruth, S. (2021, May). A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In 2021 5th international conference on intelligent computing and control systems (ICICCS) (pp. 204-211). IEEE.
Vidhya Lakshmi, G., & Vaishnavi, P. (2022). An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution. Wireless Personal Communications, 124(1), 333-348.
Sharma, R. S., Keswani, B., & Goyal, D. (2022). Analysis of routing and security issues in OLSR protocol for video streaming over MANET. Journal of Discrete Mathematical Sciences and Cryptography, 1-9.
Korir, F. C., & Cheruiyot, W. (2022). A survey on security challenges in the current MANET routing protocols. Global Journal of Engineering and Technology Advances, 12(01), 078-091.
![Flow Chart for RAS](https://www.ijisae.org/public/journals/1/submission_2529_2813_coverImage_en_US.png)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Rajesh B. Walde, Om Prakash, M. Sunil Kumar, Bipin Sule, Khan Vajid Nabilal, Usha C. Pawar
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.