Fuzzy based intrusion detection for cluster based battlefield MANET
MANETs are potential wireless network, where mobile nodes are connected dynamically in ad hoc basis. This unique characteristic attracted many promising applications and the one among is battlefield communication. The war troops at the edge of the network do not have any computing infrastructure for...
Saved in:
Published in: | 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) pp. 22 - 27 |
---|---|
Main Authors: | , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-08-2017
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | MANETs are potential wireless network, where mobile nodes are connected dynamically in ad hoc basis. This unique characteristic attracted many promising applications and the one among is battlefield communication. The war troops at the edge of the network do not have any computing infrastructure for communication. Therefore MANET plays a vital role in battlefield communication. Since MANET is openness to eavesdropping, routing of information causes vulnerabilities and degrades the performance of network. This necessitated developing a MANET with a novel intrusion detection system to provide reliability and security to the battlefield communication. This paper proposes a Di-Fuzzy logic technique which provides two phase detection for intrusion detection in the network. It works in a cluster based routing environment to co-ordinate and control the entire network. The selection of cluster head is based on the node with the maximum energy to improve the life time of the network. The proposed technique is simulated in network simulator NS 2.8 and the performance is evaluated by comparing with the existing Fuzzy based IDS (F-IDS) & intrusion detection and adaptive response (IDAR) system. From comparison the proposed Di-Fuzzy logic technique improves its performance in all metrics and thus provides a safe environment for battlefield communication. |
---|---|
ISBN: | 1509059180 9781509059188 |
DOI: | 10.1109/ICSTM.2017.8089121 |