Lightweight Intrusion Detection System for Secure Data Transmission in Switched Network Environments

International Journal of Electronics and Communication Engineering
© 2026 by SSRG - IJECE Journal
Volume 13 Issue 2
Year of Publication : 2026
Authors : Ritu Rani, Rishi Pal Singh
pdf
How to Cite?

Ritu Rani, Rishi Pal Singh, "Lightweight Intrusion Detection System for Secure Data Transmission in Switched Network Environments," SSRG International Journal of Electronics and Communication Engineering, vol. 13,  no. 2, pp. 91-102, 2026. Crossref, https://doi.org/10.14445/23488549/IJECE-V13I2P107

Abstract:

While increased internet connectivity offers numerous benefits, it also raises the risk of cyber-attacks by creating more points of vulnerability through system-to-system, system-to-server, and system-to-internet interactions. These interactions can be exploited to gain control over systems and their connected devices. Although security vulnerabilities and mitigation strategies have been extensively studied, there remains a significant gap in understanding how cyber-attacks leverage these vulnerabilities to compromise system performance and operations. In the context, we propose a Lightweight Intrusion Detection System (LIDS) for Secure Data Transmission in Switched Network Environments. The proposed system ensures the authenticity of data packets and prevents unauthorized nodes from joining the switched network. Specifically, the LIDS is capable of detecting both unauthorized and compromised nodes in the Switched Network Environments. The proposed LIDS is simulated extensively, and its performance is compared with state-of-the-art approaches. The results demonstrate that LIDS outperforms existing approaches based on the performance metrics evaluated in the simulation, and achieves a detection rate 5% greater than that of the existing approach.

Keywords:

Security, Connected systems, Connectivity, Intrusion detection approach.

References:

[1] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Hand- Book of Applied Cryptography, CRC Press, 2001.
[Google Scholar] [Publisher Link]
[2] A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wireless ad Hoc Networks,” IEEE Personal Communications, vol. 11, no. 1, pp. 48-60, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[3] B. DeCleene et al., “Secure Group Communications for Wireless Networks,” 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), McLean, VA, USA, vol. 1, pp. 113-117, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Christos Douligeris, and Aikaterini Mitrokotsa, “DDoS Attacks and Defense Mechanisms: Classification and State-of-the-art,” Computer Networks, vol. 44, no. 5, pp. 643-666, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Sushil Kumar et al., “Cybersecurity Measures for Geocasting in Vehicular Cyber Physical System Environments,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 5916-5926, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Daniel Krajzewicz et al., “Recent Development and Applications of SUMO – Simulation of Urban Mobility,” International Journal on Advances in Systems and Measurements, vol. 5, no. 3&4, pp. 128-138, 2012.
[Google Scholar] [Publisher Link]
[7] D. Watkins, and C. Scott, “Methodology for Evaluating the Effectiveness of Intrusion Detection in Tactical Mobile Ad-hoc Networks,” 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733), Atlanta, GA, USA, vol. 1, pp. 622-627, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Nnanna Ekedebe et al., “On a Simulation Study of Cyber Attacks on Vehicle-to-Infrastructure Communication (V2I) in Intelligent Transportation System (ITS),” Proceedings Mobile Multimedia/Image Processing, Security, and Applications, vol. 9497, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] E.C.H. Ngai, and M.R. Lyu, “Trust- and Clustering-based Authentication Services in Mobile Ad Hoc Networks,” 24th International Conference on Distributed Computing Systems Workshops, Tokyo, Japan, pp. 582-587, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[10] George P. Corser, Huirong Fu, and Abdelnasser Banihani, “Evaluating Location Privacy in Vehicular Communications and Applications,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 9, pp. 2658-2667, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Yue Cao et al., “A Reliable and Efficient Encounter-Based Routing Framework for Delay/Disruption Tolerant Networks,” IEEE Sensors Journal, vol. 15, no. 7, pp. 4004-4018, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nikos Komninos, Dimitris Vergados, and Christos Douligeris, “Detecting Unauthorized and Compromised Nodes in Mobile Ad Hoc Networks,” Ad Hoc Networks, vol. 5, no. 3, pp. 289-298, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[13] N. Komninos, “Security Architecture for Future Communication Systems,” PhD Thesis, Lancaster University, 2003.
[Google Scholar]
[14] Jiejun Kong et al., “Adaptive Security for Multi-layer Ad-hoc Networks,” Wireless Communications and Mobile Computing, vol. 2, pp. 533-547, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Amith Murthy, Muhammad Rizwan Asghar, and Wanqing Tu, “A Lightweight Intrusion Detection for Internet of Things-based Smart Buildings,” Security and Privacy, vol. 7, no. 4, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Q. Xue, J. Sun, and Z. Wei, “TJIDS: An Intrusion Detection Architecture for Distributed Network,” CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436), Montreal, QC, Canada, pp. 709-712, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[17] W. Zhang et al., “Secure Routing in Ad Hoc Networks and a Related Intrusion Detection Problem,” IEEE Military Communications Conference, 2003. MILCOM 2003, Boston, MA, USA, vol. 2, pp. 735-740, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Muhammad Mahmudul Islam, Ronald Pose, and Carlo Kopp, “An Intrusion Detection System for Suburban Ad-hoc Networks,” TENCON 2005 - 2005 IEEE Region 10 Conference, Melbourne, VIC, Australia, pp. 1-6, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Yongguang Zhang, and Wenke Lee, “Intrusion Detection in Wireless Ad-hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston Massachusetts USA, pp. 275-283, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[20] G. Vigna et al., “An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks,” 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, pp. 16-27, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Gang Xu, and L. Iftode, “Locality Driven Key Management Architecture for Mobile Ad-hoc Networks,” 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975), Fort Lauderdale, FL, USA, pp. 436-446, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[22] K. Ilgun, R.A. Kemmerer, and P.A. Porras, “State Transition Analysis: A Rule-based Intrusion Detection Approach,” IEEE Transactions on Software Engineering, vol. 21, no. 3, pp. 181-199, 1995.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yuvraj Singh, and Sanjay Kumar Jena, “Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks,” First International Conference on Advances in Parallel Distributed Computing Technologies and Applications, Tirunelveli, Tamil Nadu, India, pp. 410-419, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Satria Mandala, Md. Asri Ngadi, and A. Hanan Abdullah, “A Survey on MANET Intrusion Detection” International Journal of Computer Science and Security, vol. 2, no. 1, pp. 1-11, 2008.
[Google Scholar] [Publisher Link]
[25] Ningrinla Marchang, and Raja Datta, “Collaborative Techniques for Intrusion Detection in Mobile Ad-hoc Networks,” Ad Hoc Networks, vol. 6, no. 4, pp. 508-523, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[26] A. Rajaram, and Dr. S. Palaniswami, “Malicious Node Detection System for Mobile Ad hoc Networks,” International Journal of Computer Science and Information Technologies, vol. 1, no. 2, pp. 77-85, 2010.
[Google Scholar] [Publisher Link]
[27] Nur Al Hasan Haldar, Muhammad Abulaish, and Syed Asim Pasha, “An Activity Pattern Based Wireless Intrusion Detection System,” 2012 Ninth International Conference on Information Technology-New Generations, Las Vegas, NV, USA, pp. 846-847, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Robert Koch, “Towards Next-Generation Intrusion Detection,” 2011 3rd International Conference on Cyber Conflict, Tallinn, Estonia, pp. 1-18, 2011.
[Google Scholar] [Publisher Link]
[29] Kaushik Das, IPSec & IPv6 - Securing the NextGen Internet.
[Google Scholar] [Publisher Link]
[30] Anup K. Ghosh, Christoph Michael, and Michael Schatz, “A Real-Time Intrusion Detection System Based on Learning Program Behavior,” Third International Workshop on Recent Advances in Intrusion Detection, Toulouse, France, pp. 93-109, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Kamaldeep et al., “IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things,” IEEE Sensors Journal, vol. 21, no. 24, pp. 28066-28076, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Cherifa Hamroun et al., “Intrusion Detection in 5G and Wi-Fi Networks: A Survey of Current Methods, Challenges, and Perspectives,” IEEE Access, vol. 13, pp. 40950-40976, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Lorenzo Diana, Pierpaolo Dini, and Davide Paolini, “Overview on Intrusion Detection Systems for Computers Networking Security,” Computers, vol. 14, no. 3, pp. 1-44, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Thomas D. Garvey, and Teresa F. Lunt, “Model Based Intrusion Detection,” Proceedings of the 14th National Computer Security Conference, Omni Shoreham Hotel Washington, D.C., pp. 372-385, 1991.
[Google Scholar] [Publisher Link]
[35] Vaishnavi Sivagaminathan, Manmohan Sharma, and Santosh Kumar Henge, “Intrusion Detection Systems for Wireless Sensor Networks using Computational Intelligence Techniques,” Cybersecurity, vol. 6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Asma Alotaibi, and Ahmed Barnawi, “IDSoft: A Federated and Softwarized Intrusion Detection Framework for Massive Internet of Things in 6G Network,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 6, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Jeng-Shyang Pan et al., “A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks,” Security and Communication Networks, vol. 2021, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Manohar Srinivasan, and N. C. Senthilkumar, “Intrusion Detection and Prevention System (IDPS) Model for IIoT Environments Using Hybridized Framework,” IEEE Access, vol. 13, pp. 26608-26621, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[39] D. Sivakumar, and B. Sivakumar, “Detection and Localization of Attackers in Wireless Networks,” International Review on Computers and Software (IRECOS), vol. 9, no. 5, pp. 854-864, 2014.
[Google Scholar] [Publisher Link]
[40] Ibrahim Al Shourbaji, and Rafat AlAmeer, “Wireless Intrusion Detection Systems (WIDS),” Advances in Computer Science and its Applications (ACSA), vol. 2, no. 3, pp. 1-6, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[41] M. Ali Aydın, A. Halim Zaim, and K. Gökhan Ceylan, “A Hybrid Intrusion Detection System Design for Computer Network Security,” Computers & Electrical Engineering, vol. 35, no. 3, pp. 517-526, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Salman Muhammad, Bagio Budiardjo, and Kalamullah Ramli, “Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment,” World Academy of Science, Engineering and Technology, vol. 77, pp. 521-524, 2011.
[Google Scholar]
[43] Ioannis Krontiris, Thanassis Giannetsos, and Tassos Dimitriou, “LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks,” Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul Turkey, pp. 1-10, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Sana Ullah Jan et al., “Toward a Lightweight Intrusion Detection System for the Internet of Things,” IEEE Access, vol. 7, pp. 42450-42471, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Ismail Butun, Salvatore D. Morgera, and Ravi Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Mustafa Al-Tahee et al., “Artificial Intelligence Assisted Cyber-Physical Systems with Intelligent Cyber Security Using Deep Learning,” 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC), Coimbatore, India, pp. 689-694, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Li He, “Design of a Lightweight Network Intrusion Detection System Based on Artificial Intelligence Technology,” Journal of Cyber Security and Mobility, vol. 13, no. 5, pp. 1129-1148, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[48] ANKIT Manderna et al., “Intrusion Detection in Internet of Things using Differential Privacy: A Hybrid Machine Learning Approach,” Ad Hoc Networks, vol. 174, 2025.
[CrossRef] [Google Scholar] [Publisher Link]