512 500

Title

Secured Intrusion Detection in Adhoc Networks

  Mahmoud Zaher 1 * ,   Nabil M. Eldakhly 2

1  Faculty of Artificial Intelligence, Egyptian Russian University (ERU), Cairo, Egypt
    (mahmoud.zaher@eru.edu.eg)

2  Faculty of Computers and Information, Sadat Academy for Management Sciences, Cairo, Egypt & French University in Cairo, Egypt
    (nabil.omr@sadatacademy.edu.eg)


Doi   :   https://doi.org/10.54216/IJWAC.050203

Received: March 28, 2022 Accepted: November 25, 2022

Abstract :

Adhoc network computing is necessary in the present IT business since adhoc networks play such a huge role in it. Making computer talents connected to information technology available on demand using the pay-as-you-use payment model is the practice under question (PAYU). It is conceptualized as a collection of computational resources that has been developed rationally. Only virtualization, a crucial component, makes it feasible to provide ad hoc network computing services. By utilizing the underlying physical computing resources, such as processing power, memory, servers, programs, and other essential resources for calculation, this approach enables the creation of logical or virtual resources (instances). Due to the cost savings associated with virtualization, Adhoc Network service providers could be able to reduce their initial investments. It results in more efficient use of the available computational resources. When employing a virtualization approach to generate many resources or instances, it is vitally crucial for the users to determine whether these virtual resources satisfy, the criteria that have been set users have set outtake several forms, one of which is the creation of Routing Protocols (VMs). When multiple Routing Protocols are created by utilizing the underlying physical computing resources, it is essential for the user that these Routing Protocols perform processing without interrupting the other, as well as without any interruption from outsiders such as intrusions, malware, hackers, etc., It is essential for the user that these Routing Protocols perform processing without interrupting the other It is necessary for the user that these Routing Protocols perform processing without interrupting the other It is of the utmost importance to have a thorough understanding of how to prevent assaults, incursions, and system failures. In this article, we introduce several different approaches, each of which makes use of a variety of security components, such as a security watchdog, an IDS/IPS system, a security framework, an access control framework, a security supervisor, etc., to provide the required level of security for the Routing Protocols and their required resources. This is accomplished by enabling the Routing Protocols to function normally and without any problems from the outside or the inside of the working environment, all while making use of the accessible.

Keywords :

Routing Protocols (VM); Intrusion Detection System.; attacks; Certificate Authority and TPA; Peer to Peer.

References :

[1] Abhishek et al. (2012),” Adhoc Network Data Security while using Third Party”, International Journal of

Scientific & Engineering Research, Vol. 3.

[2] Adnan, M.A. Razzaque (2013),” A comparative study of particle swarm optimization and Cuckoo search

techniques through problem – specific distance function”, International Conference on Information and

Communication Technology (ICoICT), Bandung, Indonesia.

[3] Akanksha, (2014),” Encryption of text characters using ASCII values”, International Journal of

Engineering Research & Technology, Vol.02 (3), pp.232-235.

[4] Ali et al. (2016),” Security and Privacy of Sensitive Data in Adhoc Network Computing: A Survey of

Recent Developments”, David C. Wyld et al. (Eds): NETCOM, NCS, WiMoNe, CSEIT, pp. 131–150.

[5] Al-Saffar (2015),” Identity Based Approach for Adhoc Network Data Integrity in Multi-Adhoc Network

Environment”, International Journal of Advanced Research in Computer and Communication Engineering

Vol. 4, Issue 8, pp.505-509.

[6] Anuja.S.Joshi et al. (2017),” Cuckoo Search Optimization- a Review”, International Conference on

Advancements in Aeromechanical Materials for Manufacturing, pp.7261-7269.

[7] Arasu, S. et al.((2013), “Privacy-Preserving Public Auditing In Adhoc Network Using HMAC Algorithm.”,

International Journal of Recent Technology and Engineering, Vol.2,pp.149-159.

[8] Ardagna et al (2015),” From security to assurance in the 143 Adhoc Network: A survey” ACM

Computational Survey, Vol 48-1, pp 1- 50.

[9] Arjuna et al. (2016),” Adhoc Network Data Security with Modified RSA Algorithm”, International Journal

of Engineering Research & Technology, Vol.5 (5), pp.205-208.

[10] Arora et al. (2012),” Adhoc Network Computing Security Issues in Infrastructure as a Service”,

International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue

1, ISSN: 2277 128X.

[11] Bachhav et al.(2015),” Secure Multi-Adhoc Network data sharing using Key Aggregate Cryptosystem for

scalable data sharing”, International Journal of Computer Science and Information Technologies, Vol. 6

(5), pp.4479-4482.

[12] Bahrami M, Singhal M (2015),”The role of Adhoc Network computing architecture in big data”,

Information Granularity, Big Data, and Computational Intelligence, Cham, Switzerland: Springer

International Publishing, pp.275-295.

[13] Bhagat, Sahu (2013),” Adhoc Network Data Security while using Third Party Auditor”, International

Journal of Computer Applications, Vol. 70– No.16, pp.9-14.

[14] Behl A (2012),” An analysis of Adhoc Network computing security issues”, World Congress on

Information and Communication Technologies (WICT).

[15] Bryan F., et al (2017),” Expanded 128-bit Data Encryption Standard”, International Journal of Computer

Science and Mobile Computing, Vol. 6, Issue. 8, pp. 133 – 142.

[16] C. Cachin, I. Keidar, and A. Shraer, “Trusting the Adhoc Network,” SIGACT News, vol. 40, no. 2, pp. 81–

86, 2009.

[17] Charmee V. Desai (2014),” Survey on Data Integrity Checking Techniques in Adhoc Network Data

Storage”, International 144 Journal of Advanced Research in Computer Science and Software Engineering,

Vol. 4,pp.292-295.

[18] Chatterjee et al., (2012),” Symmetric key Cryptography using two-way updated -Generalized Vernam

Cipher method: TTSJA algorithm”, International Journal of computer applications, Vol.42, pp.39- 42.

[19] Chen (2012),”Data security and privacy protection issues in Adhoc Network computing”, International

Conference on computer science and Electronics Engineering.

[20] Chin-Ming Hsu (2003),” A group digital signature technique for authentication “, Proceedings of IEEE

37th Annual 2003 International Conference.

[21] Chiroma et al (2017),” Bio-inspired computation: Recent development on the modifications of the cuckoo

search algorithm”, Applied Soft Computing, Vol. 61, pp.149–173.

[22] Civicioglu ,Besdok (2011),” A conceptual comparison of the Cuckoo-search, particle swarm optimization,

differential evolution and artificial bee colony algorithms”, Journal of Artificial Intelligence Review,Vol

39,pp 315–346.

[23] Cong Wang et al. (2013),” Privacy Preserving Public Auditing for Secure Adhoc Network Storage”,

Computers, IEEE Transactions, Vol. 62(2), pp.362–375.

[24] Dinh HT, Lee C, Niyato D, Wang P (2013),” A survey of mobile Adhoc Network computing: architecture,

applications, and approaches”, Wireless Communication Mobile Computing, Vol.13 (18) pp.1587-1611.

[25] Geeta, Varma, (2016)” Cuckoo Search Optimization and its Applications: A Review”, International Journal

of Advanced Research in Computer and Communication EngineeringVol.5 (11), pp.556-562. 145.

[26] Gohil, G. B., Pathak, R.K. and Patel, A. A., (2013) "Security in Computing", International Journal of

Computer Science and Mobile Computing, Vol- 2, Issue-3, pg.52 – 56.

[27] Goyal and sidhu (2014),” Third Party Auditor: An Integrity Checking Technique for Client Data Security in

Adhoc Network Computing”, International Journal of Computer Science and Information Technologies,

Vol. 5(3), pp.4526-4530.

[28] Grundy J., Almorsy, M. and Ibrahim, A. S., (2011) "Collaboration-Based Adhoc Network Computing

Security Management Framework", 4th International Conference on Adhoc Network Computing, IEEE, pp.

364- 371.

[29] Hao (2011),” A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and

Public Verifiability”, IEEE Transactions On Knowledge and Data Engineering, Vol. 23 (9), pp. 1432 –

1437.

[30] Haw et al.(2019),” Implementation of RSA Algorithm to Secure Data in Adhoc Network Computing”,

International Journal of Innovative Science, Engineering & Technology, Vol. 6 (4),pp.61-68.

 


Cite this Article as :
Style #
MLA Mahmoud Zaher , Nabil M. Eldakhly. "Secured Intrusion Detection in Adhoc Networks." International Journal of Wireless and Ad Hoc Communication, Vol. 5, No. 2, 2022 ,PP. 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)
APA Mahmoud Zaher , Nabil M. Eldakhly. (2022). Secured Intrusion Detection in Adhoc Networks. Journal of International Journal of Wireless and Ad Hoc Communication, 5 ( 2 ), 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)
Chicago Mahmoud Zaher , Nabil M. Eldakhly. "Secured Intrusion Detection in Adhoc Networks." Journal of International Journal of Wireless and Ad Hoc Communication, 5 no. 2 (2022): 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)
Harvard Mahmoud Zaher , Nabil M. Eldakhly. (2022). Secured Intrusion Detection in Adhoc Networks. Journal of International Journal of Wireless and Ad Hoc Communication, 5 ( 2 ), 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)
Vancouver Mahmoud Zaher , Nabil M. Eldakhly. Secured Intrusion Detection in Adhoc Networks. Journal of International Journal of Wireless and Ad Hoc Communication, (2022); 5 ( 2 ): 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)
IEEE Mahmoud Zaher, Nabil M. Eldakhly, Secured Intrusion Detection in Adhoc Networks, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 5 , No. 2 , (2022) : 30-49 (Doi   :  https://doi.org/10.54216/IJWAC.050203)