Call for Paper

CAE solicits original research papers for the November 2019 Edition. Last date of manuscript submission is October 31, 2019.

Read More

Insights on Security Improvements and Implications of Artificial Intelligence in MANET

Shivashankar T. M., S. B. Shivakumar. Published in Security.

Communications on Applied Electronics
Year of Publication: 2019
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Shivashankar T. M., S. B. Shivakumar
10.5120/cae2019652813

Shivashankar T M. and S B Shivakumar. Insights on Security Improvements and Implications of Artificial Intelligence in MANET. Communications on Applied Electronics 7(27):1-9, March 2019. BibTeX

@article{10.5120/cae2019652813,
	author = {Shivashankar T. M. and S. B. Shivakumar},
	title = {Insights on Security Improvements and Implications of Artificial Intelligence in MANET},
	journal = {Communications on Applied Electronics},
	issue_date = {March 2019},
	volume = {7},
	number = {27},
	month = {Mar},
	year = {2019},
	issn = {2394-4714},
	pages = {1-9},
	numpages = {9},
	url = {http://www.caeaccess.org/archives/volume7/number27/849-2019652813},
	doi = {10.5120/cae2019652813},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Mobile Adhoc Network (MANET) is claimed to be an integral part of all futuristic network and communication system e.g. cloud, reconfigurable network, Internet-of-Things (IoT), inter-domain routing, etc. However, the security problems of MANET is not yet been mitigated irrespective of archives of security approaches and solution. For a MANET system to be integrated with upcoming technologies it is required that their routing system should offer higher level of resistance against all potential threats as well as they should also offer a better flexibility to tailor the security scheme based on demand of the environment, where the mobile nodes are operating. It is also seen that Artificial Intelligence is another big boon which is currently being proliferating at faster speed and there are some segment of research where it is also claimed to contribute towards security system in MANET. Therefore, this paper offers insights to the current state of security system using conventional as well as using Artificial Intelligence to explore about its research gap.

References

  1. Jagdish Chand Bansal, Kedar Nath Das, Atulya Nagar, Kusum Deep, Akshay Kumar Ojha, “Soft Computing for Problem Solving: SocProS 2017, Volume 1”, Springer
  2. Dharma P. Agrawal, Qing-An Zeng, “Introduction to Wireless and Mobile Systems”, Cengage Learning, Technology & Engineering, pp. 640, 2015
  3. Alo, Rita Uzoma, Nwokoro Ifeanyi Stanly, and Nkwo Friday Onwe. "Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance Issues in a Global Positioning System." (2018).
  4. Yadav, Preeti, Krishan Kumar, and Mr Tarun Dalal. "Energy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environment." International Journal on Recent and Innovation Trends in Computing and Communication 6, no. 6 (2018): 121-126.
  5. Suman Paul, “Introduction to MANET and Clustering in MANET”, Anchor Academic Publishing, pp. 40, 2016
  6. Suresh Chandra Satapathy, Siba K Udgata, Bhabendra Narayan Biswal, “Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013”, Springer Science & Business Media, Computers, pp. 564, 2013
  7. Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Zubair Md. Fadlullah, “Building Next-Generation Converged Networks: Theory and Practice”, CRC Press, pp. 608, 2013
  8. Brij B. Gupta, “Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives”, CRC Press Business & Economics, pp. 666, 2018
  9. Reddy, P. Narendra, C. H. Vishnuvardhan, and V. Ramesh. "Routing Attacks in Mobile Ad hoc Networks." International Journal of Computer Science and Mobile Computing 2, no. 5 (2013).
  10. Leigh Armistead, “CIW2007- 2nd International Conference on Information Warfare & Security: ICIW2007”, Academic Conferences Limited, pp. 270, 2007
  11. Raffaele Giaffreda, Dagmar Cagáňová, Yong Li, Roberto Riggio, Agnès Voisard, "Internet of Things. IoT Infrastructures: First International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part 2", Springer, pp. 332, 2015
  12. Saha, Debashis, "Advances in Data Communications and Networking for Digital Business Transformation", IGI Global, pp. 358, 2018
  13. Nadeem, Adnan, and Michael P. Howarth. "A survey of MANET intrusion detection & prevention approaches for network layer attacks." IEEE communications surveys & tutorials 15, no. 4 (2013): 2027-2045.
  14. Gurung, Shashi, and Siddhartha Chauhan. "A novel approach for mitigating gray hole attack in MANET." Wireless Networks24, no. 2 (2018): 565-579.
  15. Mukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "EAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET." In Advanced Computing and Systems for Security, pp. 135-151. Springer, Singapore, 2018.
  16. Saha, Himadri N., and Prachatos Mitra. "Intelligent Energy Aware Fidelity Based On-Demand Secure Routing Protocol for MANET." International Journal of Computer Network and Information Security 10, no. 4 (2018): 48.
  17. Islam, Noman. (2013). Security Issues in Mobile Ad Hoc Network. 10.1007/978-3-642-36169-2_2.
  18. Vanitha, K., and AMJ Zubair Rahaman. "Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol." Cluster Computing (2018): 1-9.
  19. Krishnan, Rahul. "A Survey on Game Theory Approaches for Improving Security in MANET." American Journal of Electrical and Computer Engineering 2, no. 1 (2018): 1-4.
  20. Ye, Yongfei, Suqin Feng, Minghe Liu, Xinghua Sun, Ting Xu, and Xuming Tong. "A Safe Proactive Routing Protocol SDSDV for Ad Hoc Network." International Journal of Wireless Information Networks 25, no. 3 (2018): 348-357.
  21. Ojetunde, Babatunde, Naoki Shibata, and Juntao Gao. "Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks." Journal of Information Processing 26 (2018): 98-110.
  22. Monica, Lalita Luthra. "Evaluation of Attacks using different Parameters based on their performance." Evaluation 1 (2018): 106-110.
  23. Mandhare, Archana, and Sujata Kadam. "Performance Analysis of Trust-Based Routing Protocol for MANET." In Computing, Communication and Signal Processing, pp. 389-397. Springer, Singapore, 2019.
  24. Ahmad, Shahnawaz. "Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism." International Journal of Computer Network and Information Security 10, no. 6 (2018): 40.
  25. Eissa, Tameem, Shukor Abdul Razak, Rashid Hafeez Khokhar, and Normalia Samian. "Trust-based routing mechanism in MANET: Design and implementation." Mobile Networks and Applications 18, no. 5 (2013): 666-677.
  26. Ching-Hsien Hsu, Laurence T. Yang, Jianhua Ma, Chunsheng Zhu, "Ubiquitous Intelligence and Computing: 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011, Proceedings", Springer Science & Business Media,, pp. 592, 2011
  27. Elwahsh, Haitham, Mona Gamal, A. A. Salama, and I. M. El-Henawy. "A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm." Security and Communication Networks 2018 (2018).
  28. Silva, Vivian, Jelena Mitrovic Santos, and Siegfried Handschuh. "WordNetGraph: Structuring WordNet Natural Language Definitions."
  29. Upadhyay, Saurabh, and Aruna Bajpai. "Avoiding Wormhole attack in MANET using statistical analysis approach." International Journal on Cryptography and Information Security 2, no. 1 (2012): 15-23.
  30. Berg, Markus M. "Modelling of natural dialogues in the context of speech-based information and control systems." (2014).
  31. Vijaya Kumar, Anitha, and Akilandeswari Jeyapal. "Self-adaptive trust based ABR protocol for MANETs using Q-learning." The Scientific World Journal 2014 (2014).
  32. Misra, Sudip, P. Venkata Krishna, Akhil Bhiwal, Amardeep Singh Chawla, Bernd E. Wolfinger, and Changhoon Lee. "A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks." The Journal of Supercomputing 62, no. 1 (2012): 4-23.
  33. Mandal, Jyotsna Kumar, Goutam Saha, Debdatta Kandar, and Arnab Kumar Maji, eds. Proceedings of the International Conference on Computing and Communication Systems: I3CS 2016, NEHU, Shillong, India. Vol. 24. Springer, 2018.
  34. Loo, Jonathan, Jaime Lloret Mauri, and Jesus Hamilton Ortiz, eds. Mobile ad hoc networks: current status and future trends. CRC Press, 2016.
  35. Karmore, Preetee K., and Smita M. Nirkhi. "Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining." International journal of computer science and information technologies 2, no. 4 (2011): 1774-1779.
  36. Bu, Shengrong, F. Richard Yu, Xiaoping P. Liu, Peter Mason, and Helen Tang. "Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks." IEEE transactions on vehicular technology 60, no. 3 (2011): 1025-1036.
  37. Anzer, Ayesha, and Mourad Elhadef. "A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles." In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp. 438-445. IEEE, 2018.
  38. Meng, Guozhu, Yang Liu, Jie Zhang, Alexander Pokluda, and Raouf Boutaba. "Collaborative security: A survey and taxonomy." ACM Computing Surveys (CSUR) 48, no. 1 (2015): 1.
  39. Jenab, Kouroush, and Saeid Moslehpour. "Cyber security management: A review." Business Management Dynamics 5, no. 11 (2016): 16-39.
  40. Ruiz-Heras, A., Pedro García-Teodoro, and Leovigildo Sánchez-Casado. "ADroid: anomaly-based detection of malicious events in Android platforms." International Journal of Information Security 16, no. 4 (2017): 371-384.
  41. Song, Kevin, Paul Kim, Vedant Tyagi, and Shivani Rajasekaran. "Artificial Immune System (AIS) Based Intrusion Detection System (IDS) for Smart Grid Advanced Metering Infrastructure (AMI) Networks." (2018).
  42. Gut, Alain, and Andreas Wespi. "Increasing the Efficiency of Security Analysts." In Cybersecurity Best Practices, pp. 349-361. Springer Vieweg, Wiesbaden, 2018.
  43. Oprea, Alina, Zhou Li, Robin Norris, and Kevin Bowers. "MADE: Security Analytics for Enterprise Threat Detection." In Proceedings of the 34th Annual Computer Security Applications Conference, pp. 124-136. ACM, 2018.
  44. Lin, Derek. "Anomaly detection system for enterprise network security." U.S. Patent 9,112,895, issued August 18, 2015.
  45. Tekade, Pooja, and Nutan Dhande. "Designing Security System for Ring Topology in WSN." (2018).
  46. H. Zhang, A. Bochem, X. Sun and D. Hogrefe, "A Security Aware Fuzzy Enhanced Reliable Ant Colony Optimization Routing in Vehicular Ad hoc Networks," 2018 IEEE Intelligent Vehicles Symposium (IV), Changshu, 2018, pp. 1071-1078.
  47. W. G. Theresa and S. Sakthivel, "Fuzzy based intrusion detection for cluster based battlefield MANET," 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, 2017, pp. 22-27.
  48. P. S. Hiremath, Anuradha T and P. Pattan, "Adaptive fuzzy inference system for detection and prevention of cooperative black hole attack in MANETs," 2016 International Conference on Information Science (ICIS), Kochi, 2016, pp. 245-251.
  49. Balan, E. Vishnu, M. K. Priyan, C. Gokulnath, and G. Usha Devi. "Fuzzy based intrusion detection systems in MANET." Procedia Computer Science 50 (2015): 109-114.
  50. T. Inaba, D. Elmazi, Y. Liu, S. Sakamoto, L. Barolli and K. Uchida, "Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and Security," 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, 2015, pp. 54-60.
  51. H. Xia, Z. Jia, L. Ju, X. Li and Y. Zhu, "A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules," 2011 IEEE/ACM International Conference on Green Computing and Communications, Sichuan, 2011, pp. 124-130.
  52. P. Khatri, S. Tapaswi and U. P. Verma, "Fuzzy based trust management for wireless ad hoc networks," 2010 International Conference on Computer and Communication Technology (ICCCT), Allahabad, Uttar Pradesh, 2010, pp. 168-171.
  53. Brun, Olivier, Yonghua Yin, Erol Gelenbe, Y. Murat Kadioglu, Javier Augusto-Gonzalez, and Manuel Ramos. "Deep learning with dense random neural networks for detecting attacks against iot-connected home environments." In Recent Cybersecurity Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London. Lecture Notes CCIS, no. 821. 2018.
  54. Elwahsh H, Gamal M, Salama AA, El-Henawy IM. A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm. Security and Communication Networks. 2018;2018.
  55. A. Koesdwiady, R. Soua and F. Karray, "Improving Traffic Flow Prediction With Weather Information in Connected Cars: A Deep Learning Approach," in IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9508-9517, Dec. 2016.
  56. Ali Alheeti, K.M., Gruebler, A. and McDonald-Maier, K., 2016. Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers, 5(3), p.16.
  57. Divya, D. "Intrusion Detection in MANET using Neural Networks and ZSBT." International Journal of Computer Applications 81, no. 4 (2013).
  58. C. Liu, I. Woungang, H. Chao, S. K. Dhurandher, T. Chi and M. S. Obaidat, "Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher," 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, Kathmandu, 2011, pp. 1-5.
  59. Moradi, Zahra, Mohammad Teshnehlab, and Amir Masoud Rahmani. "Implementation of neural networks for intrusion detection in manet." In Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on, pp. 1102-1106. IEEE, 2011.
  60. Luong, N.T., Vo, T.T. and Hoang, D., 2019. FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks. Wireless Communications and Mobile Computing, 2019.
  61. S. Dadras, S. Dadras and C. Winstead, "Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment," 2018 Annual American Control Conference (ACC), Milwaukee, WI, 2018, pp. 5560-5567.
  62. L. Liang, H. Ye and G. Y. Li, "Towards Intelligent Vehicular Networks: A Machine Learning Framework," in IEEE Internet of Things Journal.
  63. T. Zhang and Q. Zhu, "Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs," in IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 148-161, March 2018.
  64. E. Petersen, M. A. To and S. Maag, "A novel online CEP learning engine for MANET IDS," 2017 IEEE 9th Latin-American Conference on Communications (LATINCOM), Guatemala City, 2017, pp. 1-6.
  65. A. Sargolzaei, C. D. Crane, A. Abbaspour and S. Noei, "A Machine Learning Approach for Fault Detection in Vehicular Cyber-Physical Systems," 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, 2016, pp. 636-640.
  66. Thylashri, S., D. Femi, S. Alex David, and A. Suresh. "Vitality and peripatetic sustain cluster key management schemes in MANET." (2018).
  67. Haakensen, Thomas J. Enhancing sink node anonymity in tactical wireless sensor networks using a reactive routing protocol. Naval Postgraduate School Monterey United States, 2017.
  68. Lu, Ting, and Jie Zhu. "Genetic algorithm for energy-efficient QoS multicast routing." IEEE Communications Letters 17, no. 1 (2013): 31-34.
  69. Chilveri, P. G., and M. S. Nagmode. "Security Issues in Heterogeneous Network: A review." International Journal of Applied Engineering Research 13, no. 1 (2018): 798-808.
  70. Garg, Rajni, and Vikas Mongia. "Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique." (2018).

Keywords

Mobile Adhoc Network, Security, Artificial Intelligence, Encryption, Robustness