Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.5.019

A Study on Zone-based Intrusion Detection in Wireless Network Environments  

Yang, Hwanseok (중부대학교 정보보호학과)
Publication Information
Abstract
It is impossible to apply the routing protocol in the wired environment because MANET consists of only mobile nodes. Therefore, routing protocols considered these characteristics are required. In particular, if malicious nodes are not excluded in the routing phase, network performance will be greatly reduced. In this paper, we propose intrusion detection technique based on region to improve routing performance. In the proposed technique, the whole network is divided into certain areas, and then attack detection within the area using area management node is performed. It is a proposed method that can detect attack nodes in the path through cooperation with each other by using completion message received from member nodes. It also applied a method that all nodes participating in the network can share the attack node information by storing the detected attack node and sharing. The performance evaluation of the proposed technique was compared with the existing security routing techniques through the experiments and the superior performance of the proposed technique was confirmed.
Keywords
Intrusion Detection; Block chain; Region-based Architecture; Mobile Ad-hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Nishani, L., Biba, M., "Machine learning for intrusion detection in MANET," a state-of-the-art survey. J Intell Inf Syst 46, pp. 391-407, 2016.   DOI
2 Shurman M.AI, Yoo S.M., Park S., " Black Hole Attack in Wireless Ad Hoc Networks.," In: Proceedings of ACM 42nd Southeast Conference (ACMSE 04), pp. 96-97, Alabama (2004).
3 Kim G, Han Y, Kim S., "A cooperative-sinkhole detection method for mobile ad hoc networks," AEU-International Journal of Electronics and Communications, ;64(5), pp. 390-397, 2010.   DOI
4 Cho JH, Chen IR. Performance analysis of hierarchi-cal group key management integrated with adaptiveintrusion detection in mobile ad hoc networks. Performance Evaluation, 68(1), pp. 58-75, 2011.   DOI
5 Mechtri L, Tolba FD, Ghanemi S., "MASID: multi-agent system for intrusion detection in MANET.," In Proceedings of Ninth IEEE International Conferenceon Information Technology : New Generations(ITNG), Las Vegas, Nevada, USA, April 2012, pp. 65-70.
6 Al-Roubaiey, A. Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H., "AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, Vol. 3, No. 1, pp. 634-640, 2010.
7 Mohanapriya M, Krishnamurthi I., "Modified DSR protocol for detection and removal of selective black hole attack in MANET.," Computers & Electrical Engineering, 40(2), pp. 530-538, 2013.   DOI
8 Kumar G, Kumar K., "An information theoretic ap-proach for feature selection.," Security and Communication Networks, 5(2), pp. 178-185, 2013.   DOI
9 Lin HC, Sun MK, Huang HW, Tseng CY, Lin HT., "A specification-based intrusion detection modelfor wireless ad hoc networks.," In Proceedings of Third IEEE International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA), Kaohsiung, Taiwan, September, pp. 252-257, 2012.