Collaborative Packet Dropping Intrusion Detection in MANETs

Author(s):  
Gopichand G ◽  
Saravanaguru Ra. A.K.

: Wireless Networks treat MANET as a network that requires no preexisting infrastructure for setting up the network and is self-organized dynamically, which is made on impermanent basis. In MANET, Nodes are peripatetic hence topology remains not fixed for them. Hence all member nodes are harmonized with each other for establishing the network. MANET includes wireless broadcast from source to destination for forwarding data in the form of packets. Before transmitting the packets from the source to the destination node, route is searched to the destination node starting from the source node. Due to the absence of special routers in MANET, the nodes themselves act as routers and co-operates in performing the routing mechanism. During the packet dispatchment to the destination from the source, there might be a critical attack which leads to the dropping of the packet. This dropping of packets is the most popular risks in MANETS. Such type of attackers applies a primary shortcut which possesses grudging characteristics since the path finding technique is vigorous and inevitable in a MANET. Many researches and investigations were performed using distinct detection methods and recommended various types of detection schemes for such attacks. There are some special routing protocols existing in MANET like AODV, DSR, DSDV, etc. which are defenseless against several types of nasty actions such as packet drops, packet modifications, packet delay etc because of the self-seeking nodes in addition to the attacker nodes present in MANET. The proposed work refers to the diverse properties of collective packet dropping intrusions and scrutinizes the classes of proposed protocols with specific topographies warehoused in wireless adhoc networks. Finally a comparative analysis with these protocols along with their approaches with reverence to throughput, time and other key determinants in MANET is performed.

Author(s):  
Rajnesh Singh ◽  
Neeta Singh ◽  
Aarti Gautam Dinker

TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. TCP works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only one or two measures. These one or two measures do not seem to be sufficient for proper analysis of improvised version of TCP. So, in this paper, the performance of different TCP versions is investigated with DSDV and AODV routing Protocols. We analyzed various performance measures such as throughput, delay, packet drop, packet delivery ratio and number of acknowledgements. The simulation results are carried out by varying number of nodes in network simulator tool NS2. It is observed that TCP Newreno achieved higher throughput and packet delivery ratio with both AODV and DSDV routing protocols.Whereas TCP Vegas achieved minimum delay and packet loss with both DSDV and AODV protocol. However TCP sack achieved minimum acknowledgment with both AODV and DSDV routing protocols. In this paper the comparison of all these TCP variants shows that TCP Newreno provides better performance with both AODV and DSDV protocols.


Author(s):  
Indrani Das ◽  
Sanjoy Das

Geocasting is a subset of conventional multicasting problem. Geocasting means to deliver a message or data to a specific geographical area. Routing refers to the activities necessary to route a message in its travel from source to the destination node. The routing of a message is very important and relatively difficult problems in the context of Ad-hoc Networks because nodes are moving very fast, network load or traffic patterns, and topology of the network is dynamical changes with time. In this chapter, different geocast routing mechanisms used in both Mobile Ad-hoc Networks and Vehicular Ad-hoc Networks. The authors have shown a strong and in-depth analysis of the strengths and weaknesses of each protocol. For delivering geocast message, both the source and destination nodes use location information. The nodes determine their locations by using the Global Positioning System (GPS). They have presented a comprehensive comparative analysis of existing geocast routing protocols and proposed future direction in designing a new routing protocol addressing the problem.


2014 ◽  
Vol 685 ◽  
pp. 587-590
Author(s):  
Qing Tan ◽  
Xiao Jing Yue

Wireless sensor network is composed of a set of sensors in a wireless network of self-organized. Research on topological structure of wireless sensor network is focused in two directions, namely plane topology structure and hierarchical topology structure. This paper gives a detailed analysis of wireless sensor networks in the flat routing protocols and hierarchical routing protocols, and compares the advantages and disadvantages of the performance of two kinds of protocol by simulation experiment.


2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
Jiangdong Lu ◽  
Dongfang Li ◽  
Penglong Wang ◽  
Fen Zheng ◽  
Meng Wang

Today, with increasing information technology such as the Internet of Things (IoT) in human life, interconnection and routing protocols need to find optimal solution for safe data transformation with various smart devices. Therefore, it is necessary to provide an enhanced solution to address routing issues with respect to new interconnection methodologies such as the 6LoWPAN protocol. The artificial neural network (ANN) is based on the structure of intelligent systems as a branch of machine interference, has shown magnificent results in previous studies to optimize security-aware routing protocols. In addition, IoT devices generate large amounts of data with variety and accuracy. Therefore, higher performance and better data handling can be achieved when this technology incorporates data for sending and receiving nodes in the environment. Therefore, this study presents a security-aware routing mechanism for IoT technologies. In addition, a comparative analysis of the relationship between previous approaches discusses with quality of service (QoS) factors such as throughput and accuracy for improving routing mechanism. Experimental results show that the use of time-division multiple access (TDMA) method to schedule the sending and receiving of data and the use of the 6LoWPAN protocol when routing the sending and receiving of data can carry out attacks with high accuracy.


2017 ◽  
Vol 5 (1) ◽  
pp. 50-63
Author(s):  
Shailja Agnihotri ◽  
K.R. Ramkumar

The paper provides insight into various swarm intelligence based routing protocols for Internet of Things (IoT), which are currently available for the Mobile Ad-hoc networks (MANETs) and wireless sensor networks (WSNs). There are several issues which are limiting the growth of Internet of Things. These include the reliability, link failures, routing, heterogeneity etc. The MANETs and WSNs routing issues impose almost same requirements for IoT routing mechanism. The recent work of the worldwide researchers is focused on this area. protocols are based on the principles of swarm intelligence. The swarm intelligence is applied to achieve the optimality and the efficiency in solving the complex, multi-hop and dynamic requirements of the wireless networks. The application of the ACO technique tries to provide answers to many routing issues. Using the swarm intelligence and ant colony optimization principles, it has been seen that, the protocols’ efficiency definitely increases and also provides more scope for the development of more robust, reliable and efficient routing protocols for the IoT. As the various standard protocols available for MANETs and WSNs are not reliable enough, the paper finds the need of some efficient routing algorithms for IoT.


Author(s):  
Shahzad Ashraf ◽  
Tauqeer Ahmed

Abstract The sensor nodes deployed in underwater environment has different routing mechanism in contrast to the terrestrial network. Getting underwater data on pollution detection, control of the ecosystem, marine mining, catastrophe avoidance and strategic surveillance thereby demands smooth packet transmission from dynamic nodes to base station encounters numerous challenges, out of which selecting best communication link between source and destination node is a key phenomenon of Underwater sensor network. The meticulous research has been conducted to search out the best link selection mythology of bodacious underwater routing protocol EnOR, SURS‐PES and USPF. The performance has been evaluated through NS2 simulation for packet delivery ratio, end-to-end delay, network lifespan and network energy consumption.


2019 ◽  
Author(s):  
Rohi Tariq ◽  
Sheeraz Ahmed ◽  
Raees Shah Sani ◽  
Zeeshan Najam ◽  
Shahryar Shafique

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.


Energies ◽  
2020 ◽  
Vol 13 (22) ◽  
pp. 5928
Author(s):  
Abbas Hasani ◽  
Claus Leth Bak ◽  
Filipe Miguel Faria da Silva

Loss of excitation (LOE) relay is one of the most essential protection elements for synchronous generators in power plants. During the last few decades, several LOE detection methods have been proposed, while limited schemes such as admittance- and impedance-based ones have been adopted for industrial applications. This study investigates and compares the behavior of some practical LOE detection schemes through extensive simulation scenarios, and from the reliability, speed, and security points of view. The simulation scenarios are accomplished by using the real-time-digital-simulator, where the phase domain model of the synchronous generator is used to develop a realistic and typical power generation system. Employing such a system, different types of complete and partial LOE incidents can be applied according to IEEE Standard C37.102-2006, while the performance of any scheme can be assessed through accurate and realistic LOE scenarios.


2019 ◽  
Vol 11 (1) ◽  
pp. 18 ◽  
Author(s):  
Jinpeng Wang ◽  
Gérard Chalhoub ◽  
Michel Misson

Recently, mobility support has become an important requirement in various Wireless Sensor Networks (WSNs). Low-power and Lossy Networks (LLNs) are a special type of WSNs that tolerate a certain degree of packet loss. However, due to the strict resource constraints in the computation, energy, and memory of LLNs, most routing protocols only support static network topologies. Data collection and data dissemination are two basic traffic modes in LLNs. Unlike data collection, data dissemination is less investigated in LLNs. There are two sorts of data-dissemination methods: point-to-multipoint and point-to-point. In this paper, we focus on the point-to-point method, which requires the source node to build routes to reach the destination node. We propose an adaptive routing protocol that integrates together point-to-point traffic and data-collection traffic, and supports highly mobile scenarios. This protocol quickly reacts to the movement of nodes to make faster decisions for the next-hop selection in data collection and dynamically build routes for point-to-point traffic. Results obtained through simulation show that our work outperforms two generic ad hoc routing protocols AODV and flooding on different performance metrics. Results also show the efficiency of our work in highly mobile scenarios with multiple traffic patterns.


Sign in / Sign up

Export Citation Format

Share Document