Identification of Compromised Nodes in MANETs using Machine Learning Technique

Full Text (PDF, 949KB), PP.1-10

Views: 0 Downloads: 0

Author(s)

Rodney Sebopelo 1,* Bassey Isong 1 Naison Gasela 1

1. Computer Science Department, North-West University, Mafikeng, South Africa

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.01.01

Received: 30 Oct. 2018 / Revised: 7 Nov. 2018 / Accepted: 15 Nov. 2018 / Published: 8 Jan. 2019

Index Terms

Security, Attacks, Intrusions, MANETs, Machine Learning

Abstract

Mobile ad hoc networks (MANETs) are faced with various security challenges emanating from malicious attacks. Their dynamic nature make nodes more vulnerable to attacks from either malicious nodes or intruders since there is no fixed infrastructure resulting in each node acting as router to transmit data. Currently, several solutions have been proposed and implemented in different ways aimed at eliminating or reducing these malicious attacks. However, the attacks still persist. Therefore, this paper proposes an efficient security mechanism based on machine learning as a solution that detects and identifies malicious attacks in real-time basis by classifying packets data as either normal or abnormal. To achieve this, we conducted experiments using logistic regression (LR) and a support vector machine (SVM) to choose the best predictive model utilizing the Iris data set. The results obtained show that LR performed better than SVM with an accuracy of 100% detection rate. Thus, LR is better suited for the identification of malicious attacks in MANETs. Furthermore, we proposed and designed a framework to detect malicious attacks in real-time in MANETs based on packet behavior using the LR model and the components were presented. We believe that, if this framework is implemented in MANETs, it could go a long way to reduce the rate of attacks in the infrastructure less network.

Cite This Paper

Rodney Sebopelo, Bassey Isong, Naison Gasela, "Identification of Compromised Nodes in MANETs using Machine Learning Technique", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.1, pp.1-10, 2019. DOI:10.5815/ijcnis.2019.01.01

Reference

[1]J. Hoebeke, I. Moerman, B. Dhoedt, and P. Demeester, "An overview of mobile ad hoc networks: applications and challenges," Journal-Communications Network, vol. 3, pp. 60-66, 2004.
[2]H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE wireless communications, vol. 11, pp. 38-47, 2004.
[3]R. P. Kumar, A. Excellencia, and P. Kanimozhi, "Providing a New EAACK to Secure Data in MANET‖," ed: IJREAT.
[4]V. Karpijoki, "Security in ad hoc networks," in Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland, 2000.
[5]M. Al-Shurman, S.-M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," in Proceedings of the 42nd annual Southeast regional conference, 2004, pp. 96-97.
[6]L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE network, vol. 13, pp. 24-30, 1999.
[7]R. S. Singamsetty, "Detection of malicious nodes in mobile ad hoc networks," University of Toledo, 2011.
[8]P. Yau and C. J. Mitchell, "Security vulnerabilities in ad hoc networks," in The Seventh International Symposium on Communication Theory and Applications, July 13–18, 2003, Ambleside, Lake District, UK, 2003, pp. 99-104.
[9]B. Kaur, "Security Architecture for MANET and Its Application in M-Governance," in Communication Systems and Network Technologies (CSNT), 2013 International Conference on, 2013, pp. 491-496.
[10]M. Kumar, A. Bhushan, and A. Kumar, "A study of wireless ad-hoc network attack and routing protocol attack," International Journal of Advanced Research in Computer Science and Software Engineering ISSN, vol. 2277, 2012.
[11]S. Boora, Y. Kumar, and B. Kochar, "A Survey on Security Issues in Mobile Ad-hoc Networks," IJCSMS International Journal of Computer Science and Management Studies, 2011.
[12]D. Djenouri, L. Khelladi, and N. Badache, "A survey of security issues in mobile ad hoc networks," IEEE communications surveys, vol. 7, pp. 2-28, 2005.
[13]J.-S. Li and C.-T. Lee, "Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks," Computer communications, vol. 29, pp. 1121-1132, 2006.
[14]W. Zhang, R. Rao, G. Cao, and G. Kesidis, "Secure routing in ad hoc networks and a related intrusion detection problem," in Military Communications Conference, 2003. MILCOM'03. 2003 IEEE, 2003, pp. 735-740.
[15]S. B. S. G. Varaprasad, "Identification of Critical Node for the Efficient Performance in Manet."
[16]B. Sivakumar and G. Varaprasad, "Identification of critical node for the efficient performance in Manet," Editorial Preface, vol. 3, 2012.
[17]N. J. Patel and R. H. Jhaveri, "Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET," International Journal of Computer Applications, vol. 122, 2015.
[18]S. Banerjee, "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks," in proceedings of the world congress on engineering and computer science, 2008.
[19]N. Komninos, D. Vergados, and C. Douligeris, "Detecting unauthorized and compromised nodes in mobile ad hoc networks," Ad Hoc Networks, vol. 5, pp. 289-298, 2007.
[20]R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, "A novel approach for grayhole and blackhole attacks in mobile ad hoc networks," in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012, pp. 556-560.
[21]D. M. Shila and T. Anjali, "Defending selective forwarding attacks in WMNs," in Electro/Information Technology, 2008. EIT 2008. IEEE International Conference on, 2008, pp. 96-101.
[22]T. O. Ayodele, "Introduction to machine learning," in New Advances in Machine Learning, ed: InTech, 2010.