DOI QR코드

DOI QR Code

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M. (Research Scholar, Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology) ;
  • Raja, S. Selvakumar (Department of Electronics and Communication Engineering, TKR College of Engineering and Technology)
  • Received : 2017.08.04
  • Accepted : 2017.12.23
  • Published : 2018.06.30

Abstract

Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Keywords

References

  1. Y.Zhang, W.Liu, W.Lio and Y.Fang, "Securing Mobile Ad Hoc Networks with Certificateless public keys," IEEE Transactions on Dependable and Secure Computing, Vol.3, No.4, pp.386-399, Oct.- December, 2006. https://doi.org/10.1109/TDSC.2006.58
  2. KekeGai, Meikang Qiu, , Zhong Ming, Hui Zhao, Longfei Qiu, "Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks," IEEE Transactions on Smart Grid, Vol.8, Issue5, pp. 2431 - 2439, February 2017. https://doi.org/10.1109/TSG.2017.2664043
  3. T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Security, New York: Springer-Verlag, 2008.
  4. KekeGai, Longfei Qiu, Min Chen, Hui Zhao, Meikang Qiu, "SA-EAST:Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing," ACM Trans. Embedded Comp. Syst., 2017.
  5. Minho Jo, "A Survey: Energy Exhausting Attacks in MAC Protocols in WBANs," Telecommunication Systems, Vol.58, No.2, pp. 153-164, February 2015. https://doi.org/10.1007/s11235-014-9897-0
  6. T. G. Dietterich, R. H. Lathrop, and T. Lozano-Perez. "Solving the multiple-instance problem with axis-parallel rectangles," Artificial Intelligence, 89(1-2):31-71, 1997. https://doi.org/10.1016/S0004-3702(96)00034-3
  7. N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, "A survey on mobility models for performance analysis in tactical mobile networks," Journal of Telecommunications and Information Technology, vol. 2, pp. 54-61, 2008.
  8. KekeGai, Meikang Qiu, Lixin Tao and Yongxin Zhu, "Intrusion detection techniques for mobile cloud computing in heterogeneous 5G," Security and communication networks, February 2015.
  9. Tran Hoang Hai, Eui-Nam Huhand and Minho Jo,"Lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, Vol.10, No.4, pp.559-572, April 2010. https://doi.org/10.1002/wcm.785
  10. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Mobile Computer Networks., Boston, MA, pp. 255-265, 2000.
  11. D. Johnson, Y. Hu, and D. Maltz, "Rfc 4728: The dynamic source routing protocol for mobile ad hoc networks for ipv4," 2007.
  12. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007. https://doi.org/10.1109/TMC.2007.1036
  13. Xiong Li, Maged Hamada Ibrahim, SaruKumari, Arun Kumar Sangaiah, Vidushi Gupta and Kim-Kwang Raymond Choo,"Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks," Computer Networks, 2017.
  14. Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, "EAACK-A Secure Intrusion-Detection, System for MANETs," IEEE Transactions on Industrial, VOL. 60, NO. 3, March 2013.
  15. Xiong Li, JiangweiNiu, SaruKumari, Fan Wu, Arun Kumar Sangaiah and Kim-Kwang Raymond Choo, "A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments," Journal of Network and Computer Applications, 2017.
  16. Juntao Gao, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori, "End-to-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach," Ad Hoc & Sensor Wireless Networks, 2015.