International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 5 , Issue 2 , PP: 30-49, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Secured Intrusion Detection in Adhoc Networks

Mahmoud Zaher 1 * , Nabil M. Eldakhly 2

  • 1 Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt - (mahmoud.zaher@eru.edu.eg)
  • 2 Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt - (nabil.omr@sadatacademy.edu.eg)
  • Doi: https://doi.org/10.54216/IJWAC.050203

    Received: March 28, 2022 Accepted: November 25, 2022
    Abstract

    Adhoc network computing is necessary in the present IT business since adhoc networks play such a huge role in it. Making computer talents connected to information technology available on demand using the pay-as-you-use payment model is the practice under question (PAYU). It is conceptualized as a collection of computational resources that has been developed rationally. Only virtualization, a crucial component, makes it feasible to provide ad hoc network computing services. By utilizing the underlying physical computing resources, such as processing power, memory, servers, programs, and other essential resources for calculation, this approach enables the creation of logical or virtual resources (instances). Due to the cost savings associated with virtualization, Adhoc Network service providers could be able to reduce their initial investments. It results in more efficient use of the available computational resources. When employing a virtualization approach to generate many resources or instances, it is vitally crucial for the users to determine whether these virtual resources satisfy, the criteria that have been set users have set outtake several forms, one of which is the creation of Routing Protocols (VMs). When multiple Routing Protocols are created by utilizing the underlying physical computing resources, it is essential for the user that these Routing Protocols perform processing without interrupting the other, as well as without any interruption from outsiders such as intrusions, malware, hackers, etc., It is essential for the user that these Routing Protocols perform processing without interrupting the other It is necessary for the user that these Routing Protocols perform processing without interrupting the other It is of the utmost importance to have a thorough understanding of how to prevent assaults, incursions, and system failures. In this article, we introduce several different approaches, each of which makes use of a variety of security components, such as a security watchdog, an IDS/IPS system, a security framework, an access control framework, a security supervisor, etc., to provide the required level of security for the Routing Protocols and their required resources. This is accomplished by enabling the Routing Protocols to function normally and without any problems from the outside or the inside of the working environment, all while making use of the accessible.

    Keywords :

    Routing Protocols (VM) , Intrusion Detection System. , attacks , Certificate Authority and TPA , Peer to Peer

    References

    [1]          Abhishek et al. (2012),” Adhoc Network Data Security while using Third Party”, International Journal of Scientific & Engineering Research, Vol. 3.

    [2]          Adnan, M.A. Razzaque (2013),” A comparative study of particle swarm optimization and Cuckoo search techniques through problem – specific distance function”, International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia.

    [3]          Akanksha, (2014),” Encryption of text characters using ASCII values”, International Journal of Engineering Research & Technology, Vol.02 (3), pp.232-235.

    [4]          Ali et al. (2016),” Security and Privacy of Sensitive Data in Adhoc Network Computing: A Survey of Recent Developments”, David C. Wyld et al. (Eds): NETCOM, NCS, WiMoNe, CSEIT, pp. 131–150.

    [5]          Al-Saffar (2015),” Identity Based Approach for Adhoc Network Data Integrity in Multi-Adhoc Network Environment”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, pp.505-509.

    [6]          Anuja.S.Joshi et al. (2017),” Cuckoo Search Optimization- a Review”, International Conference on Advancements in Aeromechanical Materials for Manufacturing, pp.7261-7269.

    [7]          Arasu, S. et al.((2013), “Privacy-Preserving Public Auditing In Adhoc Network Using HMAC Algorithm.”, International Journal of Recent Technology and Engineering, Vol.2,pp.149-159.

    [8]          Ardagna et al (2015),” From security to assurance in the 143 Adhoc Network: A survey” ACM Computational Survey, Vol 48-1, pp 1- 50.

    [9]          Arjuna et al. (2016),” Adhoc Network Data Security with Modified RSA Algorithm”, International Journal of Engineering Research & Technology, Vol.5 (5), pp.205-208.

    [10]       Arora et al. (2012),” Adhoc Network Computing Security Issues in Infrastructure as a Service”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 1, ISSN: 2277 128X.

    [11]       Bachhav et al.(2015),” Secure Multi-Adhoc Network data sharing using Key Aggregate Cryptosystem for scalable data sharing”, International Journal of Computer Science and Information Technologies, Vol. 6 (5), pp.4479-4482.

    [12]       Bahrami M, Singhal M (2015),”The role of Adhoc Network computing architecture in big data”, Information Granularity, Big Data, and Computational Intelligence, Cham, Switzerland: Springer International Publishing, pp.275-295.

    [13]       Bhagat, Sahu (2013),” Adhoc Network Data Security while using Third Party Auditor”, International Journal of Computer Applications, Vol. 70– No.16, pp.9-14.

    [14]       Behl A (2012),” An analysis of Adhoc Network computing security issues”, World Congress on Information and Communication Technologies (WICT).

    [15]       Bryan F., et al (2017),” Expanded 128-bit Data Encryption Standard”, International Journal of Computer Science and Mobile Computing, Vol. 6, Issue. 8, pp. 133 – 142.

    [16]       C. Cachin, I. Keidar, and A. Shraer, “Trusting the Adhoc Network,” SIGACT News, vol. 40, no. 2, pp. 81– 86, 2009.

    [17]       Charmee V. Desai (2014),” Survey on Data Integrity Checking Techniques in Adhoc Network Data Storage”, International 144 Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4,pp.292-295.

    [18]       Chatterjee et al., (2012),” Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm”, International Journal of computer applications, Vol.42, pp.39- 42.

    [19]       Chen (2012),”Data security and privacy protection issues in Adhoc Network computing”, International Conference on computer science and Electronics Engineering.

    [20]       Chin-Ming Hsu (2003),” A group digital signature technique for authentication “, Proceedings of IEEE 37th Annual 2003 International Conference.

    [21]       Chiroma et al (2017),” Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm”, Applied Soft Computing, Vol. 61, pp.149–173.

    [22]       Civicioglu ,Besdok (2011),” A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms”, Journal of Artificial Intelligence Review,Vol 39,pp 315–346.

    [23]       Cong Wang et al. (2013),” Privacy Preserving Public Auditing for Secure Adhoc Network Storage”, Computers, IEEE Transactions, Vol. 62(2), pp.362–375.

    [24]       Dinh HT, Lee C, Niyato D, Wang P (2013),” A survey of mobile Adhoc Network computing: architecture, applications, and approaches”, Wireless Communication Mobile Computing, Vol.13 (18) pp.1587-1611.

    [25]       Geeta, Varma, (2016)” Cuckoo Search Optimization and its Applications: A Review”, International Journal of Advanced Research in Computer and Communication EngineeringVol.5 (11), pp.556-562. 145.

    [26]       Gohil, G. B., Pathak, R.K. and Patel, A. A., (2013) "Security in Computing", International Journal of Computer Science and Mobile Computing, Vol- 2, Issue-3, pg.52 – 56.

    [27]       Goyal and sidhu (2014),” Third Party Auditor: An Integrity Checking Technique for Client Data Security in Adhoc Network Computing”, International Journal of Computer Science and Information Technologies, Vol. 5(3), pp.4526-4530.

    [28]       Grundy J., Almorsy, M. and Ibrahim, A. S., (2011) "Collaboration-Based Adhoc Network Computing Security Management Framework", 4th International Conference on Adhoc Network Computing, IEEE, pp. 364- 371.

    [29]       Hao (2011),” A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability”, IEEE Transactions On Knowledge and Data Engineering, Vol. 23 (9), pp. 1432 – 1437.

    [30]       Haw et al.(2019),” Implementation of RSA Algorithm to Secure Data in Adhoc Network Computing”, International Journal of Innovative Science, Engineering & Technology, Vol. 6 (4),pp.61-68.

     

    Cite This Article As :
    Zaher, Mahmoud. , M., Nabil. Secured Intrusion Detection in Adhoc Networks. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2022, pp. 30-49. DOI: https://doi.org/10.54216/IJWAC.050203
    Zaher, M. M., N. (2022). Secured Intrusion Detection in Adhoc Networks. International Journal of Wireless and Ad Hoc Communication, (), 30-49. DOI: https://doi.org/10.54216/IJWAC.050203
    Zaher, Mahmoud. M., Nabil. Secured Intrusion Detection in Adhoc Networks. International Journal of Wireless and Ad Hoc Communication , no. (2022): 30-49. DOI: https://doi.org/10.54216/IJWAC.050203
    Zaher, M. , M., N. (2022) . Secured Intrusion Detection in Adhoc Networks. International Journal of Wireless and Ad Hoc Communication , () , 30-49 . DOI: https://doi.org/10.54216/IJWAC.050203
    Zaher M. , M. N. [2022]. Secured Intrusion Detection in Adhoc Networks. International Journal of Wireless and Ad Hoc Communication. (): 30-49. DOI: https://doi.org/10.54216/IJWAC.050203
    Zaher, M. M., N. "Secured Intrusion Detection in Adhoc Networks," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 30-49, 2022. DOI: https://doi.org/10.54216/IJWAC.050203