Title: Efficient enhanced intrusion identification and response system for MANETs

Authors: A.V. Santhosh Babu; P. Meenakshi Devi; B. Sharmila

Addresses: Sengunthar College of Engineering, Tiruchengode Tamil Nadu, India ' K.S.R. Institute for Engineering and Technology, Tiruchengode, Tamil Nadu, India ' EBET Group of Institutions, Kangayam, Tamil Nadu, India

Abstract: Mobile ad hoc networks (MANETs) are the new generation of self organising networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to the diverse nature of MANET routing is the major challenge. Security for MANETS has become a difficult problem than the security in other networks. Authentication and encryption would be used as the primary defence. Second level of defence to detect and respond to the security problem called an intrusion identification system. In this paper, two phased enhanced intrusion identification and response (t-EIIAR) system for multi hop cluster based MANETs is proposed. The two phases of the proposed method: 1) cluster formation and cluster head selection; 2) the enhanced identification and response system. The fuzzy c means algorithm (FCM) is used to form the cluster and the Intuitionistic Fuzzy TOPSIS (IFT) method used to calculate the trust value for each node in the cluster, based on the trust value select the cluster head and identify the intrusion levels. Finally the intrusion response action is performed from the intrusion level classifications. In the performance analysis, t-EIIAR system maximises the intrusion detection ratio, network life time and minimum energy consumption in both transmitter and receiver side.

Keywords: two phased enhanced intrusion identification and response; t-EIIAR; intrusion detection and adaptive response; IDAR; fuzzy c means algorithm; FCM; Intuitionistic Fuzzy TOPSIS; IFT; clustering; cluster head.

DOI: 10.1504/IJBIS.2018.096036

International Journal of Business Information Systems, 2018 Vol.29 No.4, pp.535 - 546

Available online: 05 Nov 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article