Mobile Ad hoc Networks (MANETs) are short lived networks that are greatly utilized in many applications such
as special outdoor events, for communications in regions having no wireless infrastructure as in natural disasters, military
operations, mine site operations and urgent business meetings. The self-organizing properties of its nodes forming the network
are rapidly deployable and possess no infrastructure. Hence securing MANETs is a primary concern due to the absence of a
central infrastructure and node mobility for which Intrusion Detection System (IDS) has been adopted in addition to the primary
lines of defence such as cryptography and authentication. A Hierarchical IDS, namely, the Zone based IDS, functions in
MANETs based on node collaboration and detects network layer intrusions with better accuracy. The proposed Cross Layer
Detection in cohesion with anomaly detection technique of Zone based IDS aids in detecting attacks originating from the deeper
layers of protocol stack, namely, physical and MAC layer thus providing better monitoring and improving the detection
accuracy in Zone based IDS. The simulation results showcase an effective increase in detection rates and reduced false
positives.
Keywords
MANET, IDS, Zone based IDS, Physical layer, MAC layer, network layer, Cross layer intrusion detection,
detection rate, false positive rate, trust.
B. Bains and R. Vaid, “Selective Forwarding based Intrusion Detection System for Secure Wireless Sensor Network,” International Journal of Computer Applications, vol. 77, no. 13, pp. 20–26, Sep. 2013.
G. ZHOU and A. Shrestha, “Efficient Intrusion Detection Scheme based on SVM,” Journal of Networks, vol. 8, no. 9, Sep. 2013.
N. W. Boskany, “Design of Alarm Based Network Intrusion Detection System,” Journal of Zankoy Sulaimani - Part A, vol. 16, no. 2, pp. 65–69, Apr. 2014.
K. V. and S. C. Lingareddy, “A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks,” International Journal of Computer Applications, vol. 179, no. 1, pp. 1–8, Dec. 2017.
G. Suseendran and A. Sasikumar, “Secure Intrusion-Detection System in Mobile Adhoc Networks,” Indian Journal of Science and Technology, vol. 9, no. 19, May 2016.
Krishnaveni and M. Ezhilarasi, “Robust intrusion detection system based on fuzzy C means clustering scheme implemented in IoT-based wireless sensor networks,” International Journal of Networking and Virtual Organisations, vol. 23, no. 4, p. 312, 2020.
S. Kamalesh and P. G. Kumar, “Fuzzy Based Secure Intrusion Detection System for Authentication in Wireless Sensor Networks,” Journal of Computational and Theoretical Nanoscience, vol. 14, no. 5, pp. 2465–2472, May 2017.
R. K. Sharma, H. K. Kalita, and B. Issac, “Are machine learning based intrusion detection system always secure? An insight into tampered learning,” Journal of Intelligent & Fuzzy Systems, vol. 35, no. 3, pp. 3635–3651, Oct. 2018.
M. Maheswari and R. A. Karthika, “A Novel QoS Based Secure Unequal Clustering Protocol with Intrusion Detection System in Wireless Sensor Networks,” Wireless Personal Communications, vol. 118, no. 2, pp. 1535–1557.
R. Bala Krishnan and N. R. Raajan, “An Enhanced Biometric Based Intrusion Detection System For Secure Communication,” Far East Journal of Electronics and Communications, pp. 121–131, Apr. 2016.
M. P. Arthur and K. Kannan, “Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks,” Wireless Networks, vol. 22, no. 3, pp. 1035–1059, Oct. 2015.
S. Ponomarev and T. Atkison, “Industrial Control System Network Intrusion Detection by Telemetry Analysis,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 252–260, Mar. 2016.
T. A., “Hybrid Cuckoo Search Optimization based Tuning Scheme for Deep Neural Network for Intrusion Detection Systems in Cloud Environment,” Journal of Research on the Lepidoptera, vol. 51, no. 2, pp. 209–224, Apr. 2020.
R. Mitchell and I.-R. Chen, “Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16–30, Jan. 2015.
Acknowledgements
Author(s) thanks to Dr.Nicoleta Dascalu for this research completion and Data validation support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Susan Bandecchi
Susan Bandecchi
Division de Natural Science, Universidad de Sonora, Hermosillo, Son., Mexico.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Susan Bandecchi and Nicoleta Dascalu, “Intrusion Detection Scheme in Secure Zone Based System”, Journal of Computing and Natural Science, vol.1, no.1, pp. 019-025, January 2021. doi: 10.53759/181X/JCNS202101005.