Secure intrusion detection system routing protocol for mobile ad‐hoc network

Rajendra Prasad P , Shiva shankar
{"title":"Secure intrusion detection system routing protocol for mobile ad‐hoc network","authors":"Rajendra Prasad P ,&nbsp;Shiva shankar","doi":"10.1016/j.gltp.2021.10.003","DOIUrl":null,"url":null,"abstract":"<div><p>With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 399-411"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023/pdfft?md5=2e47f9310aad19d4a1bbef62cee40e4b&pid=1-s2.0-S2666285X21001023-main.pdf","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Transitions Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
移动自组网安全入侵检测系统路由协议
随着无线网络或移动自组织网络(manet)领域的最新进展,移动计算是网络通信和连接的最强大用途。有效的网络会遇到许多困难。网络需要能够以可接受的精度将数据从一个系统传输到另一个系统。对于大多数应用程序,框架必须确保检索到的数据与传输的数据一致。如果两个节点之间的帧在数据链路层中失真,则必须在驱动到其他节点之前进行校正。然而,大多数带有链路层的协议只是简单地丢弃帧,并允许高层协议向下传递该帧。换句话说,信息是一种有价值的商品,因为必须保护资产信息免受威胁。一些应用需要一种网络机制来检测和防止这些攻击。在网络中建立安全的入侵检测系统,为网络中的节点和路由路径提供安全保障是MANET面临的一个重要挑战。网络中的攻击会威胁到入侵检测系统引擎识别出的安全问题,然后由网络中的入侵防御引擎进行防御。在网络中引入安全入侵检测系统(S-IDS, security - intrusion Detection System)是一种实现安全目标和防止攻击的新技术。研究工作介绍了面向manet的安全能量路由(SER)协议。该协议通过检测和阻止网络中的攻击,解决了网络中的安全问题。仿真结果表明,在有攻击和无攻击的情况下,该算法具有较高的数据包传输率和较低的端到端时延。该协议具有较好的分组传输率和较低的端到端时延。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network Grid interconnected H-bridge multilevel inverter for renewable power applications using repeating units and level boosting network Power Generation Using Ocean Waves: A Review Development of an Arabic HQAS-based ASAG to consider an ignored knowledge in misspelled multiple words short answers Smartphone assist deep neural network to detect the citrus diseases in Agri-informatics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1