Affiliation:
1. Badji Mokhtar-Annaba University, Algeria
2. Department of Computer Science, Embedded Systems Laboratory (LASE), Badji Mokhtar-Annaba University, Algeria
Abstract
In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide range of routing attacks. In the proposed hierarchical architecture, cluster nodes run a host specification-based intrusion detection system to detect specification violations attacks such as fabrication, replay, etc. While the cluster heads run an anomaly-based intrusion detection system to detect wormhole and rushing attacks. The proposed specification-based detection approach relies on a set of specifications automatically generated, while anomaly-detection uses statistical techniques. The proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security framework is evaluated by simulation in presence of malicious nodes that can launch different attacks. Simulation results show that the proposed hybrid security framework performs significantly better than other existing mechanisms.
Reference31 articles.
1. Alattar, M., Sailhan, F. & Bourgeois, J. (2012). Log-based intrusion detection for MANET. Proceedings of the Wireless Communications And Mobile Computing Conference (IWCMC), LIMASSOL (pp. 697-702). USA: IEEE.
2. Amara Korba, A., Mehdi, N., & Salim, G. (2014). Analysis of security attacks in AODV. Proceedings of the 2014 International Conference On Multimedia Computing And Systems (ICMCS).
3. Hybrid Intrusion Detection Framework for Ad hoc networks
4. Amish, P. & Vaghela, V. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia computer science, 79, 700-707.
5. Barani, F., & Abadi, M.I. (2012). BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. The ISC international journal of information security, 4(1), 25–39.