Loading

Trust Aware Intrustion Detection System to Defend Attacks in Manet
Adilakshmi Yannam1, G.V.S.N.R.V. Prasad2

1Adilakshmi Yannam, Research Scholar, Department of Computer Science and Engineering, Jawaharlal Nehru Technology Univerisity, Kakinada (A.P), India
2G.V.S.N.R.V. Prasad, Professor, Department of Computer Science and Engineering, Gudlavalleru Engineering College, Gudlavalleru (A.P), India
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1298-1306 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3815048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Intrusion detection is a most concentrated problem in the MANET environment due to increased intruders who would interrupt the normal transactions. Intrusion detection has been performed in various existing works by adapting the different procedure. In our existing work namely Game Theoretic based Cooperative Intrusion Detection System (GT-CIDS), intrusion attacks that happens in the cooperative way is performed. However this research method failed to prevent the intrusion that is performed by the genuine nodes who are compromised. This is focused in this research method and introduced the method namely Trust and Novel Key based Cooperative Intrusion Detection System (TNK-CIDS). The main goal of this research work is to detect the intrusion attacks happening in the mobile node communication to ensure the successful data transmission without interruption. In this work initially monitoring node for intrusion detection is selected which can detect the malicious activities happening on the environment. This monitoring node selection is performed in terms of trust value where the mobile node with increased trust value would be chosen. After node selection data communication is performed between mobile nodes. In order to increase the security level here the data contents are encrypted where the encryption keys are generated using new secret key generation method. This increases the security level which can protect the data content from the hackers. Finally the involvement of the intruders is detected by finding the variation in the traffic flow which is transmitted between mobile nodes. This is measured by introducing the entropy metrics based on which malicious nodes can be detected. The overall assessment of the research work is conducted in the NS2 simulation environment in terms of intrusion detection ratio and ensured that the proposed TNK-CIDS is better than the GT-CIDS.
Keyword: Intrusion Detection, Cooperative Attacks, Trust Evaluation, New Secret Key Generation, Authentication, Entropy Measurement.
Scope of the Article: Digital System and Logic Design