دانلود رایگان مقاله انگلیسی سیستم تشخیص نفوذ هوشمند برای شناسایی گره های مخرب توسط رمزنگاری منحنی در MANET - اشپرینگر 2017

عنوان فارسی
سیستم تشخیص نفوذ هوشمند مبتنی بر اعتماد چند منظوره برای شناسایی گره های مخرب با استفاده از رمزنگاری منحنی بیضی شکل در MANET
عنوان انگلیسی
Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
13
سال انتشار
2017
نشریه
اشپرینگر - Springer
فرمت مقاله انگلیسی
PDF
کد محصول
E6668
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و فناوری اطلاعات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، شبکه های کامپیوتری
مجله
محاسبه خوشه ای - Cluster Computing
دانشگاه
IKG PTU - Kapurthala - Punjab - India
کلمات کلیدی
سیستم تشخیص نفوذ هوشمند مبتنی بر اعتماد چند منظوره، شبکه های ad hoc موبایل (MANETs)، مدیریت اعتماد، الگوریتم رمزنگاری منحنی بیضی (ECC) و گره مخرب
چکیده

Abstract


Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet dropping attack, Sybil attack, and flooding attack. Therefore, the wireless network should be protected using encryption, firewalls, detection schemes to identify the attackers and decreasing their impact on the network. So, it’s an essential task to design the intelligent intrusion detection system. This research work deals with designing the multilevel trust based intelligence intrusion detection system with cryptography schemes for detecting the attackers. In order to identify the attackers, we propose a novel trust management with elliptic curve cryptography (ECC) algorithm. At first, a trust manager is maintained, its functions is to classify the trust into three different sets of trust level based upon the elliptic curve cryptography and Schnorr’s signature in the MANET. Each trust level has identified a single attacker. Thus, the proposed method has detected three types of attackers such as black hole attack, flooding attack and selective packet dropping attack. Furthermore, it have provided countermeasure for these attackers in the MANET as well as improved performances. Hence, it obtains higher throughput, minimum delay, minimum packet loss and efficient end to end delivery in MANET. Thus, the proposed scheme is a secure and optimal solution to encounter attackers, which represents to be efficient and significant.

نتیجه گیری

5 Conclusion


This research study has addressed the different security issues in designing an intrusion detection system in mobile ad hoc network (MANET). However, AODV protocol is susceptible to various attacks because of this weakest security design. We focus on detecting the attacks such as a black hole attack, flooding attack and selective packet dropping attack by designing multi-level trust based intelligence intrusion detection system with cryptography scheme. In this paper, we utilize the multi-level intelligent intrusion detection system for detecting the malicious node with the help of trust management and elliptic curve cryptography. In trust management based on the three levels of trusts such as level-1 are direct trust, auto trust, indirect trust, others trust, level-2 are subjective trust, objective trust and level-3 are static trust and dynamic trust, the proposed system estimates the trust length and key verification. If the trust length is maximum then risk factor is the minimum possibility of the attackers is remains to be zero or else the flooding and selective packet dropping attackers are detected through the ECC algorithm. Moreover, it produces all possible paths with their trust length and highest trust length path is selected as a secure and best route for the routing process under AODV. The antihole mechanism is adapted to detect the black hole attacker, by the amount of difference between the RREQs and RREPs is higher during data transmission. Hence, it eliminates malicious node from the network in order to obtain higher packet delivery ratio, throughput, minimum delay, minimum packet loss and effi- cient end to end delivery with high security in MANET. Thus, simulation results for detection of the black hole attacker, trust length ratio, and the performance metrics are effective in this strategy. Hence, the proposed method is more significant than the neighbor node trust method. In future enhancement, this mechanism would extend to identify lot more attackers in the MANET.


بدون دیدگاه