scholarly journals Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 251
Author(s):  
Pooja Rani ◽  
Kavita ◽  
Sahil Verma ◽  
Navneet Kaur ◽  
Marcin Wozniak ◽  
...  

The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered one of the most affecting threats in the MANET in which the attacker node drops the entire data traffic and hence degrades the network performance. Therefore, it necessitates the designing of an algorithm that can protect the network from the BHA node. This article introduces Ad-hoc On-Demand Distance Vector (AODV), a new updated routing protocol that combines the advantages of the Artificial Bee Colony (ABC), Artificial Neural Network (ANN), and Support Vector Machine (SVM) techniques. The combination of the SVM with ANN is the novelty of the proposed model that helps to identify the attackers within the discovered route using the AODV routing mechanism. Here, the model is trained using ANN but the selection of training data is performed using the ABC fitness function followed by SVM. The role of ABC is to provide a better route for data transmission between the source and the destination node. The optimized route, suggested by ABC, is then passed to the SVM model along with the node’s properties. Based on those properties ANN decides whether the node is a normal or an attacker node. The simulation analysis performed in MATLAB shows that the proposed work exhibits an improvement in terms of Packet Delivery Ratio (PDR), throughput, and delay. To validate the system efficiency, a comparative analysis is performed against the existing approaches such as Decision Tree and Random Forest that indicate that the utilization of the SVM with ANN is a beneficial step regarding the detection of BHA attackers in the MANET-based IoT networks.

2018 ◽  
Vol 7 (1.9) ◽  
pp. 6 ◽  
Author(s):  
Pandi Selvam Raman ◽  
Shankar K ◽  
Ilayaraja M

Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


2019 ◽  
Vol 16 (9) ◽  
pp. 3906-3911
Author(s):  
Karan Singh ◽  
Rajeev Gupta

Recent progression in the field of information and communication cause increase of packet count over the World Wide Web network. These communicated packets should deliver on time from origin node to destination node using a reliable and shortest route. In this way routing plays an important part in dispatching the packets to destination form the source. This routing becomes more crucial when packets delivery is done in independent mobile nodes which dynamically form a temporary network. This network named as Mobile Ad-Hoc Network and therefore it is said to be particular reason-specific, self-ruling and dynamic. In this paper we analyzed 3 protocols and for a quality of service (i.e., Packet Delivery Ratio) and achieved comparative study of various protocols of routing with respect to Operation of protocols, Route maintenance, Routing table, Route, Route selection, Routing structure, Routing Approaches, Protocol types, Merits and Demerits.


Author(s):  
J. Kaur ◽  
S. Kaur

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.


2020 ◽  
Vol 8 (5) ◽  
pp. 2125-2131

A MANETs (Mobile Ad Hoc Network) is a prearranged form of cellular nodes besides any infrastructure. The finest route determination in MANETs is a difficult task to progress the routing performance. A multipath strategies and link based resource optimized routing (MSR-OR) method is proposed to choose the best route for proficient data packet communication in MANETs. The MSR-OR Technique is used Selective Retransmission method to minimize high channel contention causing redundant a RREQ through combining both neighbor coverage and selective methods. The Selective Re-transmission method reduces the number of retransmissions and therefore optimizes resource utilization for data transmission, which in resulting improved packet delivery ratio with lower energy utilization. The functioning of MSR-OR Technique is deliberate as far as energy utilization, end to end delay (E-E-D), packet delivery ratio, and network lifetime (NLT). The simulation result shows that the MSR-OR Technique is improves the packet delivery ratio with minimum NLT for data transmission.


Author(s):  
Sudesh Rani ◽  
Trilok C. Aseri

Background and Objective: Vehicular Ad hoc Network (VANET) now-a-days is popular research area due to numerous challenges such as congestion control, network management, and security issues. Methods: VANET is a subtype of Mobile Ad hoc Network (MANET), therefore, allows a vehicle to exchange information with neighboring vehicles and with roadside infrastructure units. High mobility of vehicles results to frequent link breakages. The existing VANET routing protocols follow a trivial link repair mechanism. Therefore, there is a need to compute stable and reliable routes for vehicular communication as well as frequently repair the broken links. Ad hoc On-demand Distance Vector (AODV) routing protocol is a reactive routing protocol which is suitable for very dynamic environment such as VANET. In this paper, an improved Randomized Link Repair based AODV (RLRAODV) routing protocol is proposed which uses the multiple route reply packets for data transmission through alternate paths during link failure. The proposed methodology also reduces the network congestion overhead generated due to broadcasting of route request packets. Results and Conclusion: The simulation analysis shows that RLR-AODV gives better performance with respect to performance parameters such as average end-to-end delay, average packet delivery ratio, and average packet loss ratio as compared to AODV and AOMDV.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 439 ◽  
Author(s):  
Min Wook Kang ◽  
Yun Won Chung

Hybrid protocols combining a mobile ad hoc network (MANET) and a delay tolerant network (DTN) have recently been proposed. In these works, a whole network is fragmented, and MANET is generally used for intra-fragment communication, while DTN is used for inter-fragment communication. In this paper, an improved hybrid routing protocol was proposed, wherein virtual source nodes are selected based on the delivery predictability to the destination node if routing path to the destination node is not successfully established using MANET protocol. Then, messages are delivered to the destination node from the original source node and selected virtual source nodes. Performance evaluation results show that the proposed protocol with appropriate selection of delivery predictability threshold values has a better delivery ratio than conventional protocol, at the expense of overhead ratio in the considered parameter setting.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Adwan Yasin ◽  
Mahmoud Abu Zant

Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the most widespread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pretending that it always has the best path to the destination node. AODV is a reactive routing protocol that has no techniques to detect and neutralize the black-hole node in the network. In this research, we enhanced AODV by integrating a new lightweight technique that uses timers and baiting in order to detect and isolate single and cooperative black-hole attacks. During the dynamic topology changing the suggested technique enables the MANET nodes to detect and isolate the black-hole nodes in the network. The implementation of the proposed technique is performed by using NS-2.35 simulation tools. The results of the suggested technique in terms of Throughput, End-to-End Delay, and Packet Delivery Ratio are very close to the native AODV without black holes.


Author(s):  
Rajnesh Singh ◽  
Neeta Singh ◽  
Aarti Gautam Dinker

TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. TCP works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only one or two measures. These one or two measures do not seem to be sufficient for proper analysis of improvised version of TCP. So, in this paper, the performance of different TCP versions is investigated with DSDV and AODV routing Protocols. We analyzed various performance measures such as throughput, delay, packet drop, packet delivery ratio and number of acknowledgements. The simulation results are carried out by varying number of nodes in network simulator tool NS2. It is observed that TCP Newreno achieved higher throughput and packet delivery ratio with both AODV and DSDV routing protocols.Whereas TCP Vegas achieved minimum delay and packet loss with both DSDV and AODV protocol. However TCP sack achieved minimum acknowledgment with both AODV and DSDV routing protocols. In this paper the comparison of all these TCP variants shows that TCP Newreno provides better performance with both AODV and DSDV protocols.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 16
Author(s):  
T Dheepak ◽  
S Neduncheliyan

Mobile Ad Hoc Network is the centralized communication system which is used for transferring information through a secured mode from one end to another end. However, there is an energy loss that has been noticed in MANET. In this work, an efficient energy based Link Failure State Neighbor Detection Effective Efficient Protocol (LFSNDEEP) is to enhance the energy efficiency of the mobile node, and optimal transmission ratio computes Data, Audio, and Video packets. The proposed research on LFSNDEEP protocol is compared to Effective Efficient Neighbor Detection Protocol (EENDP) and which assigns the channel utilization. In this technique, the hello packet exchanges transmit based height and wavelength of the transmitter with particular distance. The computation of channel utility factor is the best method at link failure without data loss. The vitality utilization mathematical model is illustrated to show the nodes of least consumption by the broad recreation of utilization. The results observed from the proposed scheme shows that the energy level is minimized regarding the packet that loss is improved efficiently. In further, there are two results which can be gained in comparing with EENDP; firstly, packet delivery ratio and throughput get increased. And secondly, the end to end delay is decreased.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Huang Qiong ◽  
Yin Pengfei ◽  
Chen Qianbin ◽  
Gong Pu ◽  
Yang Xiaolong

Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR) based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.


Sign in / Sign up

Export Citation Format

Share Document