Enhanced replica detection scheme for efficient analysis of intrusion detection in MANET


  • P. Bakeyalakshmi
  • S. K. Mahendran






ERDS, Detection Scheme, MANET, Detection Efficiency, Delay, Network Lifetime.


Nowadays, detection scheme of intrusion is placing a major role for efficient access and analysis in Mobile Ad-hoc network (MANET). In the past, the detection scheme of Intrusion was used to identify the efficiency of the network and in maximum systems it performs with huge rate of false alarm. In this paper, an Effective approach of the Enhanced Replica Detection scheme (ERDS) based on Sequential Probability Ratio Test (SPRT) is proposed to detect the malicious actions and to have a secure path without claim in an efficient manner. Also, provides strategies to avoid attacker and to provide secure communication. In order to have an efficient analysis of intrusion detection the proposed approach is implemented based on the anomaly. To achieve this, the detection scheme is established based on SPRT and demonstrated the performances of detection with less claim. The simulation results of control overhead, packet delivery ratio, efficient detection, energy consumption and average claims are carried out for the analysis of performance to show the improvement than the existing by using the network simulator tool. Also, the performance of the proposed system illustrated the detection of intrusion in the normal and attacker states of the network.


[1] Tao Shu and Marwan Krunz, “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networksâ€, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 4, APRIL 2015

[2] Ayesha Taranum, Manju N, Tejaswini R M, “RAACK-Reinforce Adaptive Acknowledgement A Secure Intrusion Detection System for MANETsâ€, International Journal of Computer Science and Information Technology Research, Vol.2, Issue 2, 2014, pp.283-296.

[3] Michael Riecker, Sebastian Biedermann, Rachid El Bansarkhani and Matthias Hollick, “Lightweight energy consumption-based intrusion detection system for wireless sensor networksâ€, International Journal of Information Security, Springer, 2014, pp.1-8.

[4] Pu Cheng, Minghua Zhu, Xianzhong Liu, “Distributed T-Distribution-Based Intrusion Detection in Wireless Sensor Networksâ€, Springer, Vol.295, 2014, pp.313-323. https://doi.org/10.1007/978-3-642-54174-2_28.

[5] Francesco Buccafurri, Luigi Coppolino, Salvatore D’Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano, “Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networksâ€, Springer, Vol.8666, 2014, pp.214-229. https://doi.org/10.1007/978-3-319-10506-2_15.

[6] Wenchao Li, Ping Yi, Yue Wu, Li Pan, and Jianhua Li, “A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Networkâ€, Journal of Electrical and Computer Engineering, Hindawi Publication, 2014, pp.1-9.

[7] K.Ankush, P.Ravindra and D.Krishna, “A Secure Intrusion-Detection System for Ad hoc mobile wireless networksâ€, International Journal of Embedded and Software Computing, Vol.5, 2014, pp.528-531.

[8] Poongothai and K.Duraiswamy, “Cross Layer Intrusion Detection System of Mobile Ad Hoc Networks using Feature Selection Approachâ€, WSEAS Transactions on Communications, Vol.13, 2014, pp.71-79.

[9] E.M.Shakshuki, Nan Kang, T.R.Sheltami, “EAACK – A Secure Intrusion Detection System for MANETsâ€, IEEE Transactions on Industrial Electronics, Vol.60, Issue 3, 2013, pp.1089-1098. https://doi.org/10.1109/TIE.2012.2196010.

[10] Gerrigagoitia, K. Uribeetxeberria, R., Zurutuza, U. and Arenaza, I., “ Reputation based Intrusion Detection System for Wireless Sensor Networksâ€, IEEE Communications on Complexity in Engineering, 2012, pp.1-5

[11] Peyman Kabiri and Mehran Aghaei, “Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networksâ€, International Journal of Network Security, Vol.12, No.1, PP.42-49, Jan. 2011

[12] Chong Eik Loo, Mun Yong Ng, Christopher Leckie and Marimuthu Palaniswami, “er 2006: pp. 1–27 Intrusion Detection for Routing Attacks in Sensor Networksâ€, International Journal of Distributed Sensor Networks, Vol.2, 2006, pp.313-332. https://doi.org/10.1080/15501320600692044.

[13] John S. Baras, Svetlana Radosavac, George Theodorakopoulos, Dan Sterne, Peter Budulas and Richard Gopaul, “INTRUSION DETECTION SYSTEM RESILIENCY TO BYZANTINE ATTACKS: THE CASE STUDY OF WORMHOLES IN OLSRâ€, Research supported by the U.S. Army Research Laboratory under the Collaborative Technology Alliance Program, Cooperative Agreement DAAD19-01-2-0011.

View Full Article: