{"title":"Secure intrusion detection system routing protocol for mobile ad‐hoc network","authors":"Rajendra Prasad P , Shiva shankar","doi":"10.1016/j.gltp.2021.10.003","DOIUrl":null,"url":null,"abstract":"<div><p>With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 399-411"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023/pdfft?md5=2e47f9310aad19d4a1bbef62cee40e4b&pid=1-s2.0-S2666285X21001023-main.pdf","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Transitions Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.