scholarly journals Enhanced replica detection scheme for efficient analysis of intrusion detection in MANET

2017 ◽  
Vol 7 (1.1) ◽  
pp. 565
Author(s):  
P. Bakeyalakshmi ◽  
S. K. Mahendran

Nowadays, detection scheme of intrusion is placing a major role for efficient access and analysis in Mobile Ad-hoc network (MANET). In the past, the detection scheme of Intrusion was used to identify the efficiency of the network and in maximum systems it performs with huge rate of false alarm. In this paper, an Effective approach of the Enhanced Replica Detection scheme (ERDS) based on Sequential Probability Ratio Test (SPRT) is proposed to detect the malicious actions and to have a secure path without claim in an efficient manner. Also, provides strategies to avoid attacker and to provide secure communication. In order to have an efficient analysis of intrusion detection the proposed approach is implemented based on the anomaly. To achieve this, the detection scheme is established based on SPRT and demonstrated the performances of detection with less claim. The simulation results of control overhead, packet delivery ratio, efficient detection, energy consumption and average claims are carried out for the analysis of performance to show the improvement than the existing by using the network simulator tool. Also, the performance of the proposed system illustrated the detection of intrusion in the normal and attacker states of the network.

Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


2018 ◽  
Vol 150 ◽  
pp. 06024 ◽  
Author(s):  
Fahad Taha AL-Dhief ◽  
Naseer Sabri ◽  
M.S. Salim ◽  
S. Fouad ◽  
S. A. Aljunid

Mobile Ad Hoc Network (MANET) is a set of mobile nodes that communicate with each other to configure an immediate network without utilizing any of infrastructure, the centralized access point or centralized administration in multiple hop manner. There are a lot of routing protocols have been proposed in MANET which are different from each other in the performance and the mechanism. Therefore, the performance study of those protocols in different scenarios is needed. This paper presents the performance comparison between Dynamic Source Routing (DSR), Ad hoc on demand distance Vector Routing (AODV) as reactive routing protocols and Destination Sequenced Distance Vector (DSDV) as a proactive routing protocol to precisely determine which protocol is more effective. Network Simulator (NS) version 2.35 has used to simulate and evaluate the performance of these protocols in terms of the packet delivery ratio, average throughput, average end-to-end delay, and packet loss ratio with respect to the variable number of nodes.


Author(s):  
D. Sivamurugan ◽  
L. Raja

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.


Author(s):  
Elsa Mustikawati ◽  
Doan Perdana ◽  
Ridha Muldina Negara

VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONESimulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for blackhole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 22
Author(s):  
A Aranganathan ◽  
C D. Suriyakala

Intrusion detection is one of challenging issues in wireless networks. The inherently vulnerable characteristics of wireless mobile ad hoc networks make them susceptible to attacks in-spite of some security measures, and it may be too late before any counter action can take effect. As such, there is a need to complement security mechanisms with efficient intrusion detection and response systems. This paper proposes an agent-based model to address the aspect of intrusion detection in cluster based Mobile ad hoc network environment. The model comprises of mobile agents, which are used to detect intrusions, respond to intrusions, mainly preventing the routing attacks while securing them and distributing selected and aggregated intrusion information to all other nodes in the network in an intelligent manner to compensate the attack. The model is simulated to test its operation effectiveness by considering various performance parameters such as, packet delivery ratio, communication overhead, throughput. It implements a secure detection and prevention technique that contains the Blowfish algorithm which is a symmetric encryption and decryption algorithm having a secure standard till date against attacks to make the network transmission secure while monitoring malicious nodes and preventing them from compromising the integrity of the network. Agent based approach facilitates flexible and adaptable security services. Also, it supports component based software engineering components such as maintainability, reachability, reusability, adaptability, and flexibility. 


Mobile Ad hoc Network(MANET) provides wireless communication withoutany infrastructure. MANET generally uses a most popular and well-suited routing protocolthat is Ad hoc on Demand Distance Vector (AODV). Random topology and mobilityin MANET cause link break multiple times in network due to which poor link quality thatresults in packet losses in the network. In this paper, link quality improvement in AODV routing protocol is focused. Link quality issue can be resolved through Cross-layer design(CLD) interaction in the OSI communication model. This technique called as Reliable-AODV. CLD is implemented by interacting Physical firstlayer and network third layer of the OSI model, CLDinteraction help in strong route formation inAODV for Reliable-AODV. The result shows an improvement in the system Performance in terms of metricslike throughput, Packet Delivery Ratio(PDR) and reduction in the packet losses, delay ofthe network. Network simulator used for performance analysis is NS-2.a Simulation tool that shows improvement in results. Castadiva Emulator with Wi-Fi routers and laptop are used as test bed architecture for validating sample results of simulations. It is observed that some small variation in the


Wireless communication could be a requirement of this era as all industries are approaching for the internet of things and automation. Even supposing multiple choices are ready for wireless communication, Mobile ad hoc Network (MANET) gives wireless communication while not having any infrastructure. MA NET typically adopts a preferred and well fitted routing protocol that is Ad hoc On Demand Distance Vector (AO D V). Stochastic topology inside MANET antecedent link breaks various times in network because of that feeble link quality that appears as packet extinction within the network. In the modern wireless communication study, it is noted that the performance of system deteriorates because of feeble link creation or link wreckage in the network. In this paper, link quality improvement in AODV routing protocol is focused. Link quality concern is proposed to resolve through Cross layer design (C L D) interaction in the OSI communication model. CLD enforced by interacting Physical initial layer and network middle layer of the OSI model, CLD facilitate in robust route formation in AODV named as CLDAO D V. The result exhibits growth within the system Performance in terms of factors like throughput, Packet Delivery Ratio (PDR) and decline in the packet losses and delays in the network. Network simulator used for performance analysis are NS2 and NS3.


A mobile ad hoc network (MANET) forms self-autonomous networks which mean nodes are communicated without the aid of any access point. This network forms an ad hoc (provisional) network which is node are random moves in the simulation area. AntNet is a bio-inspired routing protocol based on real Ant behaviour. Nowadays, Swarm Intelligence (SI) techniques are widely used in various domains. In mobility, nodes are taken seldom position and moving randomly. In this work, we have used standard mobility models like Random Way Point (RWP) model. Also, AntNet routing protocol has been used with well-known wireless routing protocols such as Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The Performance measures modeling (PMM) used to increase the QoS (Quality of Service) results. Therefore, the performance results of the proposed AntNet-PMM model revealed that better results when compared with other models. The Simulation work was made in Network Simulator (NS2). The obtained NS2 output will be given input to Curve fitting tool in MATLAB. In this work, Packet Delivery Ratio (PDR), Average Delay and Throughput are considered as QoS parameters. Moreover, curve fitting expressions are used to enhance better accuracy such as polynomial expression, rational expression, and power expression.


2020 ◽  
Vol 21 (1) ◽  
pp. 137-145
Author(s):  
D Rajalakshmi ◽  
K Meena

The security in a mobile ad hoc networks is more vulnerable and susceptible to the environment, because in this network no centralized environment for monitoring individual nodes activity during communication. The intruders are hacked the networks either locally and globally. Now a day’s mobile ad hoc network is an emerging area of research due to its unique characteristics. It’s more vulnerable to detect malicious activities, and error prone in nature due to their dynamic topology configuration. Based on their difficulties of intrusion detection system, in this paper proposed a novel approach for mobile ad hoc network is Fuzzy Based Intrusion Detection (FBID) protocol, to identify, analyze and detect a malicious node in different circumstances. This protocol it improves the efficiency of the system and does not degrade the system performance in real time.This FBID system is more efficient and the performance is compared with AODV, Fuzzy Cognitive Mapping with the following performance metrics: Throughput, Packet Delivery Ratio, Packets Dropped, Routing overhead, Propagation delay and shortest path for delivering packets from one node to another node. The System is robust. It produces the crisp output to the benefit of end users. It provides an integrated solution capable of detecting the majority of security attacks occurring in MANETs.


Sign in / Sign up

Export Citation Format

Share Document