Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier

Author(s):  
Gopalakrishnan Subburayalu ◽  
Hemanand Duraivelu ◽  
Arun Prasath Raveendran ◽  
Rajesh Arunachalam ◽  
Deepika Kongara ◽  
...  

Mobile Ad hoc Network (MANET) is essentially a framework much less network. It carries out certainly not demand any kind of predetermined network. Every nodule is serving as a recipient and also a transmitter. All the nodules in the MANET are essentially taken on as functioning within a welcoming as well as collaborative network circumstance. There is essentially no base station to handle the relocating gadgets. There is essentially no safety to guard the nodules. Any kind of nodule may function as a misbehaving nodule. Such uncooperative habits may significantly diminish network efficiency as well as might also cause complete interaction failure. The destructive nodules may effortlessly assault the mobile nodules. In this particular newspaper, our experts have essentially suggested an Intrusion Detection System through which the harmful nodules are essentially spotted and also certainly there due to the functionality of the network are going to be essentially raised.


Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


Sign in / Sign up

Export Citation Format

Share Document