International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING ISSN:2147-67992147-6799 www.ijisae.org Original Research Paper International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2023, 11(3s), 14–21 | 14 An Secured Intrusion Detection System Integrated with the Conditional Random Field For the Manet Network Burhan R Rexhepi 1 , Avneesh Kumar 2 , M.S. Gowtham 3 , R Rajalakshmi 4 , Ms. Divya Paikaray 5 , Pronab Kumar Adhikari 6 Submitted: 03/11/2022 Accepted: 03/02/2023 Abstract MANET is a wireless network that lacks infrastructural support. Most operations they perform are coordinated between nodes because of their limited transmission range. Assess the secure MANET routing protocol in a malicious environment. However, in the MANET environment security is an important constraint that affects the data transmission rate and cause data loss. This paper developed an Intrusion Detection System Conditional RandomField (IDS – CRF) model for security. The developed model uses the hashing function integrated with the Conditional Random Field model. The IDS – CRF model uses the label sequences for data security in the MANET environment. The model uses the DSR protocol with the discriminative field to process the secure data in the MANET. The proposed IDS-CRF model uses the hashing function for improved data transmission security in the MANET environment. The performance of the proposed IDS – CRF model is comparatively examined with the conventional DSR protocol. The comparative analysis expressed that the proposed IDS – CRF model achieves the ~4% reduction in the delay and ~2% reduction in the routing overhead. Similarly, the proposed IDS – CRF model achieves the ~4% reduced energy consumption. In terms of the Packet delivery ratio and throughput the proposed IDS – CRF model achieves the ~4% - ~6% improved performance than DSR model. Keywords:Conventional Random Field, Intrusion Detection System, MANET, Security, DSR protocol. 1. Introduction A MANET is a wireless network consisting of clusters of wireless devices which are connected dynamically via wireless links to transmit information [1]. Personal computers (such as laptops and desktops, mobile phones or other types of mobile or wireless communication devices) can form wireless nodes. Any device that uses air as a medium for transmitting information can form a wireless node in MANET. These nodes can be physically connected to airplanes, vehicles, or people to enable communication between them [2]. The mobile node can serve as a router, receiver or sender. Whenever node serve as router, it receives data packets and transmits them to neighboring node, thus forwarding it to target node [3]. The router moves freely and organizes itself in a random manner; thereby quickly changing the topology of any wireless network in an unpredictable way. Such networks operate using independent strategies, or they can be part of a larger Internet. MANET is not safe due to its dynamic nature. Therefore, it is significant to be careful about the data sent through MANET [4]. Compared to the fixed-cable networks, wireless networks tend to get affected by the threats of physical security more often [5]. Careful consideration is needed for attacks like DoS, Spoofing and eavesdropping, which frequently occurs in a MANET [6]. In MANET, network control is decentralized in nature, which is a benefit when compared with the approaches that are centralized in nature. This is because the robustness of a decentralised system is comparatively higher than the centralized approaches [7]. This makes the system vulnerable to multiple threats. The central authority distributes keys to include security elements in infrastructure-based systems [8]. In a self- organizing network, solutions based on cryptography must include a method of distributing keys in a distributed way. In MANET, even if the quality of the decision-making process is decentralized, all nodes present in it must _______________________________________________________________________________________________ 1 Accounting Lecturer, MBE, UBT College - Higher Education Institution. bulikont@hotmail.com 2 Professor, Department of Computer Application,Galgotias University, Greater Noida, Uttar Pradesh, India. avneesh.avn119@gmail.com, 0000-0001-5860-3689 3 Associate professor, ECE, Karpagam institute of technology, Coimbatore, Tamil Nadu, India. gowtham.ece@karpagamtech.ac.in 0000-0003-1300-7183 4 ECE, Panimalar engineering College, Chennai, Tamil Nadu, India. rajeeramanathan@gmail.com 0000-0002-4399-4071 5 Assistant Professor, School of Engg.&IT, ARKA JAIN University, Jamshedpur, Jharkhand, India. divya.p@arkajainuniversity.ac.in 0000-0001-7886-1538 6 Assistant Professor, (Ajay Kumar Garg Engineering College, Ghaziabad), India. pthepronab@gmail.com