Performance Evaluation of FBU-NDA Based IDS Using AODV in MANET

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)
© 2014 by IJETT Journal
Volume-16 Number-4
Year of Publication : 2014
Authors : TruptiAgrawal , Swati Tiwari


TruptiAgrawal , Swati Tiwari. "Performance Evaluation of FBU-NDA Based IDS Using AODV in MANET", International Journal of Engineering Trends and Technology (IJETT), V16(4),180-185 Oct 2014. ISSN:2231-5381. published by seventh sense research group


MANET is a less infrastructure network with vigorously changing topologies and arbitrary communicating node. At this time the mobile nodes communicate directly with additional nodes without any router and hence the preferred functionalities are embedded to each node. Since the MANETconsistof mobile nodes with less configuration of hardware and requirements compared to a router, henceprotocols and routing used are of lightweight functionalities. The range of protocol in MANET is categorized in two types: Proactive and Reactive. This work deal with enhancingMANET security through intrusion detection system for the AODV reactive protocol. The nodes that work towards degrading the normal network performance arecalled as malicious or attacker nodes. The sort of traffic generated by such node is nasty and affects the lifetime of network and other performance factor. Also the intruder’s node aim towards modification of actual packet information and forge them for diverting the network traffic through these malicious nodes which later on dropped or delayed. Hence, such intruder’s nodes need to be identified timely for making the safe and secure communication in the network. For the period of the last few years, many approaches had been suggested along with several intrusion detection systems. Though there are some problems which remain unaddressed and are not resolved as required. In the presence of these nodes or in delays of such detection the network performance gets down continuously. In this idea it proposes a novel scheme based on FBU-NDA (Feature Based Unified Node Data Analysis) for AODV in MANET. These scheme is capable of detecting the intruder’s node by continuously analyzing the network parameters and getting the acknowledgement counts. It also serves as a regular monitoring which access the behavior of each node. Result evaluation and comparison makes the actual assessment of the suggested approach and proves to be improved that traditional approach.


[1] MarjanKuchaki Rafsanjani, Ali Movaghar, and FaroukhKoroupi, “Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes”, in World Academy of Science, Engineering and Technology, 2008.
[2] M Salman Ashraf1 and Muhammad Raheel2, “RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks”, IJCSI International Journal of Computer Science Issues, ISSN (Online): 1694-0814, Vol. 9, Issue 2, No 2, March 2012, pp 306-313.
[3] O. V. Chandure , A. P. Bakshi, S. P. Tidke and P. M. Lokhande, “Simulation of Secure AODV in Gray Hole Attack for Mobile Ad-Hoc Network”, in International Journal of Advances in Engineering & Technology, ISSN: 2231-1963, Vol. 5, Issue 1, Nov. 2012. , pp. 67-76.
[4] Farhan Abdel-Fattah, Zulkhairi Md. Dahalin and ShaidahJusoh, “Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm”, in IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010.
[5] RakeshShrestha, Kyong-Heon Han, Dong-You Choi and Seung-Jo Han, “A Novel Cross Layer Intrusion Detection System in MANET”, in IEEE International Conference on Advanced Information Networking and Applications, ISSN 1550-445X/10, DOI 10.1109/AINA.2010.52, 2010.
[6] Tushar Sharma, MayankTiwari, Prateek Kumar Sharma, Manish Swaroop and Pankaj Sharma, “An Improved Watchdog Intrusion Detection Systems In Manet”, in International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2 Issue 3, March-2013.
[7] Yi Li and June Wei, “Guidelines on Selecting Intrusion Detection Methods in MANET”, in Proc. Of ISECON (EDSIG), Vol.21, (Newport): §3233 (refereed), 2004.
[8] Fanzine Pakzad, MarjanKuchaki Rafsanjani and ArshamBorumandSaeid, “The Improvement Steps of Intrusion Detection System Architectures of MANET”, in IJMAS, ISSN: 0973-7545, Vol. 22, Issue S11, 2011.
[9] Mohammad Alattar, Françoise Sailhan and Julien Bourgeois, “Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol”, in International Journal of Distributed Sensor Networks Volume 2013, Article ID 521497, 20 pages at
[10] Charlie Obimbo and Liliana Maria ArboledaCobo, “An Intrusion Detection System for MANET”, Communications of Information Science and Management Engineering (CISME), Vol.2 No.3, 2012. Pp. 1-5
[11] G. S. Mamatha1 and Dr. S. C. Sharma,”A New Combination Approach to Secure MANETS Against Attacks”, International Journal of Wireless & Mobile Networks (IJWMN), DOI: 10.5121/ijwmn.2010.2406, Vol.2, No.4, November 2010.
[12] AikateriniMitrokotsa and Christos Dimitrakakis, “Intrusion detection in MANET uses classification algorithms: The effects of cost and model selection”, in ScienceDirect, Elsevier Publication, Journal of Ad-Hoc Networks, ISSN: 1570-8705, available at, 2012.
[13] S. Mamatha and Dr A Damodaram, “Quantitative Behavior Based Intrusion Detection System for MANETS”, in Proc. of the Intl. Conf. OnAdvances in Computing and Communication (ICACC), ISBN: 978-981-07-6260-5 doi: 10.3850/ 978-981-07-6260-5_59, April 2013.
[14] Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, “EAACK—A Secure Intrusion-Detection System for MANETs”, in IEEE Transaction on Industrial Electronics, ISSN: 0278-0046,Vol. 60, No 3, March 2013.
[15] Umesh Prasad Rout, “A Study of Intrusion Detection Systems in MANETs”, in International Journal of Research in Computer and Communication Technology, ISSN (Online) 2278-5841, Vol 2, Issue 2, Feb-2013. Pp 86-92.
[16] Trupti Agrawal and Swati Tiwari. “A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET”, in International Journal of Computer Applications, ISBN : 973-93-80883-85-7, September 18, 2014.

MANET (Mobile Ad-hoc Network), AODV (Ad-hoc On demand Distance Vector Routing), FBU-NDA(Feature Based Unified Node Data Analysis), IDS (Intrusion Detection System), Performance Factors;