scholarly journals Identification of Malicious Nodes & Paths to Reduce Packet Loss in Mobile ADHOC Network with NS2 Simulator

System security assumes a vital job in this MANET and the customary method for ensuring the systems through firewalls and encryption programming is never again powerful and adequate. So as to give extra security to the MANET, interruption location components ought to be included. In this paper, particular affirmation is utilized for distinguishing vindictive hubs in the specially appointed system. NS2 is utilized to recreate and assess the proposed plan and look at it against the AACK. The acquired outcomes demonstrate that the specific affirmation conspire outflanks AACK as far as system bundle conveyance proportion and directing overhead. Portable Ad-hoc Network is an impermanent system made out of versatile hubs, associated by remote connections, without settled infrastructure. This paper proposes a novel component considered specific affirmation for taking care of issues that emerge with Adaptive Acknowledgment (AACK). Points of interest in this paper are security is expanded and can enhance the execution of the system.

Author(s):  
S. Maharaja ◽  
R. Jeyalakshmi ◽  
A.V. Sabarish Kanna ◽  
M. Deva Priya

A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).


Author(s):  
Gurpreet Singh, Ganpat Joshi

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.


Author(s):  
Abdul Shabbir ◽  
Anasuri Sunil Kumar

Mobile Adhoc Network(MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines of defense. This paper discusses a fool proof key exchange mechanism and a network model to protect the network containing malicious nodes. The reputation of a node increases as long as the node transfers the message properly and decreases otherwise. Moreover, it has minimum computation and communication overhead which makes it viable.


2017 ◽  
Author(s):  
Anuj Mehta

Mobile Ad-hoc network (MANET) is a collection of self configuring, multi-hop wireless network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is more vulnerable to different types of attacks and security threats because of its characteristics. A routing protocol in a mobile Ad hoc network should be against both inside and outside attackers. Most of the routing protocols in MANETs assume that all the nodes in a network will cooperate to each other while forwarding data packets to other nodes. But intermediate nodes may cause several problems like it can deny to forward the packet, can also extract useful information from the packet or may modify the content of packet. Such nodes are referred as malicious nodes. We present a survey of the main types of routing protocols and some security threats and various detection scheme against attack.. This paper also classifies several common attacks against the ad-hoc networks routing protocols based upon the techniques that could be used by attackers to exploit routing messages.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


2015 ◽  
Vol 62 (2) ◽  
pp. 141-145 ◽  
Author(s):  
Rezvi Shahariar ◽  
Abu Naser

In mobile ad hoc network communication is performed usually by using only send and receive messages and every node is powered by limited energy from low capacity battery. Every send or receive message takes particular amount of energy from the node. So node’s total energy level gradually decreases each time while it is sending or receiving something. In this way node will die out and packets coming from the source will be dropped since one of the routing node on the current route is no longer functioning. These packet loss events are observed and minimized in this paper. In the proposed approach, when source receives Warning Message from any routing node on the ongoing route then it will stop sending packets on the ongoing route. Critical energy level of routing node has been defined to generate a Warning Message when routing node’s energy level reduces to critical energy level. DOI: http://dx.doi.org/10.3329/dujs.v62i2.21979 Dhaka Univ. J. Sci. 62(2): 141-145, 2014 (July)


2021 ◽  
Author(s):  
Rajakumar.R ◽  
PandianR ◽  
PremJacob.T ◽  
Pravin.A ◽  
Indumathi.P

The primaryaim of an ad-hoc network routing protocol is accurate and efficient route creation between node pairs so that messages may be delivered promptly. Route creation need to be done with reduced overhead and bandwidth. This paper presents a scheme to reduce bandwidth and power by the hibernation of nodes for a limited time. The effect of our proposal is then studied by simulation under various conditions and the analysis of the simulation results is done to comprehend the working of our protocol in various areas and how it fares in an application specific scenario.


Author(s):  
Saju P. John ◽  
Philip Samuel

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner.


Sign in / Sign up

Export Citation Format

Share Document