Open Access
Subscription Access
Open Access
Subscription Access
Securing Mobile Ad-Hoc Networks Using Robust Secured IPS Routing Approach through Attack Identification and Elimination in MANETs
Subscribe/Renew Journal
Mobile Ad-hoc Networks (MANETs) are susceptible to various security threats due to their decentralized and dynamic nature. Among these threats, Distributed Denial of Service (DDoS) and sibling attacks pose significant challenges to the integrity and availability of network services. This paper presents a novel approach for securing MANETs against DDoS and sibling attacks through a robust Intrusion Prevention System (IPS) integrated with a secured routing mechanism. The proposed methodology leverages residual transfer learning to adapt a pre-trained model for intrusion detection to the MANET environment, enhancing its effectiveness in identifying and mitigating attacks. The problem of securing MANETs against DDoS and sibling attacks is exacerbated by the lack of centralized infrastructure and the dynamic topology of the network. Traditional security mechanisms designed for wired networks are often ineffective in MANETs due to their reliance on centralized control and communication. This research addresses this gap by proposing an IPS solution tailored specifically for MANETs, capable of detecting and preventing attacks without relying on centralized coordination. By utilizing residual transfer learning, the proposed methodology addresses the challenge of limited labeled data in the MANET domain. Transfer learning enables the adaptation of knowledge from a pre-trained model on non-MANET data to improve the performance of intrusion detection in MANET environments. The integration of the IPS with a secured routing approach ensures that detected attacks are efficiently handled within the network, minimizing their impact on performance and ensuring continued operation. Experimental results demonstrate the effectiveness of the proposed approach in mitigating DDoS and sibling attacks in MANETs. The integrated solution achieves high detection rates while minimizing false positives, thereby enhancing the security and resilience of MANETs against evolving threats.
Keywords
Mobile Ad-Hoc Networks, Intrusion Prevention System, Residual Transfer Learning, DDoS Attack, Sibling Attack.
Subscription
Login to verify subscription
User
Font Size
Information
- Feng Li and Jie Wu, “Attack and Flee: Game -Theory - Based Analysis on Interactions among Nodes in MANETs”, IEEE Transaction on System, Man and Cybernetics, Vol. 40, No. 3, pp. 612-622, 2010.
- B. Sundaravadivazhagan and P. Jaganathan, “Adaptive Threshold Probabilistic Counter based Broadcast Scheme for Mobile Ad Hoc Networks n Route Discovery”, Asian Journal of Information Technology, Vol. 13, No. 9, pp. 569-574, 2014.
- Sarah Omar Al-Humoud, Lewis M. Mackenzie and Jamaldeen Abdulai, “Neighbourhood-Aware Counter-based Broadcast Scheme for Wireless Ad Hoc Networks”, IEEE Global Communication Workshops, pp. 1-6, 2008.
- K. Singh and R. Gupta, “Performance Evaluation of a MANET Based Secure and Energy Optimized Communication Protocol (E2S-AODV) for Underwater Disaster Response Network”, International Journal of Computer Networks and Applications, Vol. 8, No. 1, pp. 11-27. 2021.
- K. Haseeb, N. Abbas, M.Q. Saleem and T. Salam, “RCER: Reliable Cluster-Based Energy-Aware Routing Protocol for Heterogeneous Wireless Sensor Networks”, PLoS ONE, Vol. 14, No. 9, pp. 1-24, 2019.
- Z. Wang and Q. Liu, “Energy Efficient Cluster based Routing Protocol for WSN using Firefly Algorithm and Ant Colony Optimization”, Wireless Personal Communications, Vol. 125, No. 3, pp. 2167-2200, 2022.
- Ping Yi, Zhoulin Dai, Shiyong Zhang and Yiping Zhong, “A New Routing Attack in Mobile Ad Hoc Networks”, International Journal of Information Technology, Vol. 11, No. 2, pp. 83-94, 2005.
- Alessandro Mei and Julinda Stefa, “Give 2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individual”, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 4, pp. 569-581, 2012.
- Xin Jin, Yaoxue Zhang, Yi Pan and Yuezhi Zhou, “ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs”, EURASIP Journal on Wireless Communications and Networking, pp. 1-9, 2006.
- Wei Ren, Dit-Yan Yeung, Hai Jin and Mei Yang, “Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks”, International Journal of Network Security, Vol. 4, No. 2, pp. 227-234, 2007.
- T.E. Bogale and L. Vandendorpe, “Max-Min SNR Signal Energy based Spectrum Sensing Algorithms for Cognitive Radio Networks with Noise Variance Uncertainty”, IEEE Transactions on Wireless Communications, Vol. 13, No. 1, pp. 280-290, 2014.
- Y.H. Robinson, V. Saravanan and P.E. Darney, “Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks”, Wireless Personal Communications, Vol. 119, pp. 3569-3588, 2021.
- N.M.M. Hiraide and N. Yoshida, “Trust Management in Growing Decentralized Networks”, Journal of Computations and Modelling, Vol. 12, No. 3, pp. 1-12, 2022.
Abstract Views: 109
PDF Views: 0