Skip to main content
Log in

Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

5G-based mobile ad hoc networks with cloud are a new paradigm that combines several real-world applications. Routing and security are current issues in MANETs. Security is highly important in MANET and cloud environments for preventing harmful attacks. Therefore, a trusted environment is required for a MANET with cloud-based 5G communications. In this paper, we propose a new framework called trust-aware intrusion detection and prevention system (TA-IDPS) for protecting the network from adversaries. TA-IDPS consists of a MANET, a cloudlet, and a cloud service layer. Initially, we register and authenticate mobile nodes using an ultra-lightweight symmetric cryptographic technique, which is highly suitable for resource-constrained environments. In MANETs, high energy consumption, scalability, and authentication are important issues, which are addressed by the proposed moth flame optimization algorithm. If the cluster head (CH) receives data packets from a source node, they are classified as normal, malicious, and suspicious using a deep belief network. Intra-cluster routing is implemented by an adaptive Bayesian estimator using next-best forwarder selection. In the cloudlet layer, cloudlets are used to aggregate packets from the CH and verify their legitimacy so that they can be forwarded to the cloud service layer. Each cloudlet is provided with a peek monitor for classifying suspicious packets as malicious and normal using Awads information entropy. Experiments are conducted using NS3.26. The performance of the proposed TA-IDPS and previous methods is analyzed using widely used metrics. The evaluation results demonstrated that the proposed TA-IDPS system outperformed the previous methods in terms of all metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (2010)

  2. Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mobile Comput. 16(16), 2572–2589 (2016)

    Article  Google Scholar 

  3. Lacuesta, R., Lloret, J., Sendra, S., Peñalver, L.: Spontaneous ad hoc mobile cloud computing network. Sci. World J. 2014, 1–19 (2014)

    Article  Google Scholar 

  4. Alghamdi, S.A.: Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wirel. Netw. 22(4), 1355–1363 (2015)

    Article  Google Scholar 

  5. Alghamdi, S.A.: Cuckoo energy-efficient load-balancing on-demand multipath routing protocol. Arab. J. Sci. Eng. (2021). https://doi.org/10.1007/s13369-021-05841-y

  6. Alnumay, W., Ghosh, U., Chatterjee, P.: A trust-based predictive model for mobile ad hoc network in internet of things. Sensors 19(6), 1467 (2019)

    Article  Google Scholar 

  7. Belgaum, M.R., Musa, S., Su’ud, M.M., Alam, M., Soomro, S., Alansari, Z.: Secured approach towards reactive routing protocols using triple factor in mobile adhoc networks. Ann. Emerg. Technol. Comput. 3, 32–40 (2019)

    Article  Google Scholar 

  8. Zhang, San-shun, Wang, Shi-wen, Hui, Xia, Cheng, Xiang-guo: An attack-resistant reputation management system for mobile ad hoc networks. Proc. Comput. Sci. 147, 473–479 (2019)

    Article  Google Scholar 

  9. Faisal, M., Abbas, S., Ur Rahman, H.: Identity attack detection system for 802.11-based ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018,128 (2018). https://doi.org/10.1186/s13638-018-1143-0

  10. Gurung, S., Chauhan, S.: Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 25(3), 975–988 (2017)

    Article  Google Scholar 

  11. Roles, A., ElAarag, H.: Coexistence with malicious and selfish nodes in wireless ad hoc networks: a Bayesian game approach. J. Algorithms Comput. Technol. 11(4), 353–365 (2017)

    Article  MathSciNet  Google Scholar 

  12. Taheri, Yaser, Gharaee, Hossein, Mohammadzadeh, Naser: A game theory approach for malicious node detection in MANETs. J. Inf. Sci. Eng. 32, 559–573 (2016)

    MathSciNet  Google Scholar 

  13. Manoranjini, J., Chandrasekar, A., Jothi, S.: Improved QoS and avoidance of black hole attacks in MANET using trust detection framework, Automatika. (2019). https://doi.org/10.1080/00051144.2019.1576965

  14. Yasin, A., Abu-Zant Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security Commun Netw. 1–12 (2019)

  15. Elwahsh, H., Gamal, M., Salama, A., Henawy, I.: A Novel approach for classify MANETs attacks with a neutrosophic intelligent system based on genetic algorithm. Secur. Commun. Netw (2018)

  16. Karlsson, J., Dooley, L. S., Pulkkis, G.: Secure routing for MANET connected internet of things systems. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (2018)

  17. Sultana, J., Ahmed, T.: Elliptic curve cryptography based data transmission against blackhole attack in MANET. Int. J. Electr. Comput. Eng. (IJECE) 8, 4412 (2018)

    Article  Google Scholar 

  18. Aranganathan, A., Suriyakala, C.D.: An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 10, 3493–3503 (2019). https://doi.org/10.1007/s12652-018-1069-8

  19. Alam, T., Benaida, M.: The role of cloud-MANET framework in the Internet of Things (IoT). Int. J. Online Eng. (iJOE) 14, 97–111 (2018)

    Article  Google Scholar 

  20. Li, J., Li, X., Gao, Y., Gao, Y., Zhang, R.: Dynamic cloudlet-assisted energy-saving routing mechanism for mobile ad hoc networks. IEEE Access 5, 20908–20920 (2017)

    Article  Google Scholar 

  21. Naveena, A., Reddy, K.R.L.: Malicious node prevention and mitigation in MANETs using a hybrid security model. Inf. Secur. J. Global Perspect. 27(2), 92–101 (2018)

    Article  Google Scholar 

  22. Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, A.: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mobile Comput. 16(8), 2174–2183 (2017)

    Article  Google Scholar 

  23. Yasin, A., Abu Zant, M.: Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mobile Comput. 2018, 1–10 (2018)

    Article  Google Scholar 

  24. Singh, O., Singh, J., Singh, R.: Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput. 21(1), 51–63 (2017)

    Article  Google Scholar 

  25. Guo, Y., Zhang, H., Zhang, L., Fang, L., Li, F.: A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30, 118–126 (2019)

    Article  MathSciNet  Google Scholar 

  26. Xia, H., Cheng, X., Zheng, Y., Liu, A.: A novel light-weight subjective trust inference framework in MANETs. IEEE Trans. Sustain. Comput. 1–1 (2018)

  27. Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K., Pathan, M., Hussain, M., Memon, M.: A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3), 61 (2019)

    Article  Google Scholar 

  28. Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. Int. J. Inf. Technol. 11(2), 345–356 (2018)

    Google Scholar 

  29. Sen, B., Meitei, M. G., Sharma, K., Ghose, M.K., Sinha, S.: A trust-based intrusion detection system for mitigating blackhole attacks in MANET. In: Advanced Computational and Communication Paradigms, pp. 765–775 (2018)

  30. Singh, K., Singh, K.: Intrusion detection and recovery of MANET by using ACO algorithm and genetic algorithm. Next-Generation Networks, pp. 97–109 (2017)

  31. Vaseer, G., Ghai, G., Ghai, D.: Novel intrusion detection and prevention for mobile Ad hoc networks: a single-and multiattack case study. IEEE Consum. Electron. Mag. 8(3), 35–39 (2019)

    Article  Google Scholar 

  32. Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10, 16 (2018)

    Article  Google Scholar 

  33. Alnumay, W., Ghosh, U., Chatterjee, P.: A trust based predictive model for mobile Ad hoc network in internet of things. Sensors 19(6), 1–14 (2019)

    Article  Google Scholar 

  34. Cai, R.J., Li, X.J., Chong, P.H.J.H.J.: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans. Mob. Comput. 18(1), 42–55 (2019)

    Article  Google Scholar 

  35. Marathe, N., Shinde, S.K.: ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing, Wirel. Pers. Commun. 1–24 (2019)

  36. Dbouk, T., Mourad, A., Otrok, H., Talhi, C.: Towards ad-hoc cloud based approach for mobile intrusion detection. In: 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. (2016). https://doi.org/10.1109/WiMOB.2016.7763251

  37. Shila, D.M., Shen, W., Cheng, Y., Tian, X., Shen, X.S.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74–81 (2017)

    Article  Google Scholar 

  38. Gautam, D., Tokekar, V.: An approach to analyze the impact of DDOS attack on mobile cloud computing. In: 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) (2017)

  39. Chen, M., Wang, N., Zhou, H., Chen, Y.: FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Comput. Electr. Eng. 71, 978–987 (2018)

    Article  Google Scholar 

  40. Abbas, S., Faisal, M., Rahman, H.U., Khan, M.Z., Merabti, M., Khan, A.: Masquerading attacks detection in mobile ad hoc networks. IEEE Access 6, 55013–55025 (2018)

    Article  Google Scholar 

  41. Sowah, R.A., Ofori-Amanfo, K.B., Mills, G.A., Koumadi, K.M.: Detection and prevention of man-in-the-middle spoofing attacks in manets using predictive techniques in artificial neural networks (ANN). J. Comput. Netw. Commun. 2019, 1–14 (2019)

    Article  Google Scholar 

  42. Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)

    Article  Google Scholar 

  43. Mirjalili, S.: Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl. Based Syst. 89, 228–249 (2015). https://doi.org/10.1016/j.knosys.2015.07.006

  44. Harikrishnan, T., Babu, C.: Cryptanalysis of hummingbird algorithm with improved security and throughput. In: 2015 International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI-SATA) (2015)

  45. Engels, D., Fan, X., Gong, G., Hu, Honggang, Smith, E.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. Financ. Cryptogr. Data Secur. 6054, 3–18 (2010)

    Article  Google Scholar 

  46. Fan, X., Hu, H., Gong, G., Smith, E., Engels, D.: Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1–7 (2009)

  47. Santos, J., Leroux, P., Wauters, T., Volckaert, B., De Turck, F.: Anomaly detection for Smart City applications over 5G low power wide area networks. In: NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

  48. Chen, L.-J., Ho, Y.-H., Hsieh, H.-H., Huang, S.-T., Lee, H.-C., Mahajan, S.: ADF: an anomaly detection framework for large-scale PM2.5 sensing systems. IEEE Internet Things J. 5(2), 559–570 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saleh A. Alghamdi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alghamdi, S.A. Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud. Int. J. Inf. Secur. 21, 469–488 (2022). https://doi.org/10.1007/s10207-020-00531-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-020-00531-6

Keywords

Navigation