scholarly journals Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad-HOC Network

The general behavior of Mobile AdHoc Networks (MANETs) is different in certain stages due to its mode of operations and maintenance as well as factors such as NodeEnergy level, manipulation energy, randomly movable nature and the topology-changes. These type of dynamicity causes or needs over concentration and needs more security with routingstability. For eliminating these issues and improve the security, a new methodology called Fuzzy Secured Node Selection Routing (FSNSR) is defined, which provides the Trusted-Network-Service and better performance with energy efficiency in security and dynamicity perspectives. This algorithm FSNSR provides highreliability and dynamicity to nodes, which can move frequently without any security causes and attain more robustness during performance. The selection of next node selection and forwarding is purely based on the link-stability and nextneighbor availability, which is ensured by means of the parental node by sending route-request and getting response for the request. Once the neighbor provides the response properly for the raised request the node will be treated as a next successful neighbor, otherwise the node will be considered as a malicious node and which cannot be considered for next process further. The survey results further to guarantee regarding the network robustness, dynamicity, good packet delivery ratio, goodput and secure-routing over MANET with the help of Fuzzy Secured Node Selection Routing.

2018 ◽  
Vol 26 (3) ◽  
pp. 25-36
Author(s):  
Deo Prakash ◽  
Neeraj Kumar ◽  
M.L. Garg

Mobile Adhoc Network (MANET) is a dynamic network without any centralized control. Due to frequent topological change, routing has been always a challenging task in these networks. This article presents optimized routing for efficient data dissemination in MANETs to meet the fast-changing technology of today's world. A novel metric for such optimized routing in MANET is proposed. The main parameters considered to evaluate this metric are the energy consumed during the communication, link stability, Packet Delivery Ratio (PDR) and traffic. The concept is based on a scenario in which a mobile node (source) sends data packets to another mobile node (destination) through its dynamically connected neighboring nodes. The path which consumes the lowest energy and also shows highest link stability is selected for consideration. In case the paths consume the same amount of energy, the highest stable path is chosen. In this manner, the most optimized path is selected. The authors' routing approach shows more efficiency than earlier in dissemination of data and information over the Mobile Ad-Hoc Networks.


Author(s):  
S. Ashok Kumar ◽  
E. Suresh Babu ◽  
C. Nagaraju ◽  
A. Peda Gopi

<div><table cellspacing="0" cellpadding="0" align="left"><tbody><tr><td align="left" valign="top"><p>Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent.  In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.</p></td></tr></tbody></table></div>


Wireless networks are been used now-a-days. The most important fact about wireless network is it is mobile. It is thus used in many fields. One of the most important applications of wireless networks is Mobile Ad hoc NETwork (MANET) in which all the nodes work as both transmitter and receiver. MANETs are used in various fields like military, industry and emergency recovery. In order to provide adequate security against multiple attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques. Intrusion Detection and Prevention System (IDPS) is an effective defense mechanism that detects and prevents the security attacks at various levels. In recent work a polynomial key is employed for achieving useful key generation process and a polynomial is generated to compute the pair-wise key but it can be easily detected by the attacker so to improve the security in IDPS system, this work proposes the secure routing using Novel SEcured Keys Generation (NSEKG) against IDPS system. This proposal implements with two major keys: Secure Key (SeK) and Sharing key (ShK) creation is performed via the use of the User Property based Artificial Bee Colony (UPABC) algorithm and the frequency based behavior with certainty measurement on routing paths. These SeK and ShK keys creation with UPABC scheme exploits the encrypted value of the packets and the decryption determine whether the route reply is the result of a malicious node or not. The proposed NSEKG -IDPS system is very effective for communication attacks and needs to be gradually improved in order to detect multiple attacks. The performance is evaluated primarily in accordance with the subsequent metrics like Packet delivery ratio (PDR), Routing Overhead (RO), End-End-Delay (E2E), and Throughput


2019 ◽  
Vol 8 (3) ◽  
pp. 6554-6562

Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed infrastructure, where each node plays a role of the router. There are not any centralize control to handle the routing process of network, due to the dynamic tropology and infrastructure less network the network is vulnerable to various kinds of attacks. Therefore, numerous proactive, reactive and hybrid routing protocols have been recommended, among which one of the well-known a protocol is AODV due to its high-performance gain. This research work contributes towards mitigating network layer attacks on routing protocols in Wireless Ad hoc Networks. Problem and it's security issues because its consequences and existing mechanisms for detection and prevention with the context of AODV protocol is a challenge in Wireless Ad hoc Network, particularly in MANET and Sensor network. We present an AODV based secure routing algorithm for detection and prevention of different network layer attacks such as blackhole and rushing attacks. We use different types of security parameters like node sequence numbers, hop count, trust value, path value, acknowledge time, the threshold value and ALERT packet message to design a secure algorithm for AODV routing protocol. It shows enactment evaluation of AODV with the enhanced secure routing algorithm and existing routing algorithm through simulations which will confirm the effectiveness and accuracy of the algorithm by considering performance metrics like throughput, packet delivery ratio and end to end delay. Using network simulator NS-2.35 the experimental results have been shown an improvement in throughput, packet delivery ratio (PDR), and end to end delay using IDSAODV and results are compared with normal AODV routing protocol for blackhole and rushing attacks. The comparative results have been also shown with proposed IDSAODV and existing method


Author(s):  
Vimal Kumar ◽  
Rakesh Kumar

One of the generally used routing protocols for MANET is AODV (Ad hoc on demand Distance Vector), which is vulnerable to one of the particular type of security attack called blackhole attack. The characteristics of blackhole attack, a malicious node sends a false route reply without having any fresh route to a destination and is also drop all receiving packets and replay packet in the entire network. A certificateless based signature scheme enables users to generate their public key and private key without using any certificate. Due to this reason, we do not need any certificate authority (CA). In this paper, we propose a novel CLS scheme for prevention of a blackhole attack and also provide secure communication based on CLS scheme. Simulation results show that CLS scheme prevents blackhole attack successfully and is provide better performance to other existing schemes in the presence of blackhole node and also ensuring authentication, integrity and non-repudiation.


2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


Computers ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 2
Author(s):  
Tri Kuntoro Priyambodo ◽  
Danur Wijayanto ◽  
Made Santo Gitakarma

A Mobile Ad Hoc Network (MANET) protocol requires proper settings to perform data transmission optimally. To overcome this problem, it is necessary to select the correct routing protocol and use the routing protocol’s default parameter values. This study examined the effect of route request parameters, such as RREQ_RETRIES and MAX_RREQ_TIMOUT, on the Ad Hoc On-demand Distance Vector (AODV) protocol, which was then compared with the default AODV performance Optimized Link State Routing (OLSR) protocols. The performance metrics used for measuring performance were Packet Delivery Ratio (PDR), throughput, delay, packet loss, energy consumption, and routing overhead. The results show that the OLSR protocol has a smaller delay than the AODV protocol, while in other measurements, the AODV protocol is better than OLSR. By reducing the combination value of RREQ_RETRIES, MAX_RREQ_TIMEOUT in AODV routing to (2, 10 s) and (3, 5 s), the protocol’s performance can be improved. The two combinations result in an average increase in throughput performance of 3.09%, a decrease in delay of 17.7%, a decrease in packet loss of 27.15%, and an increase in PDR of 4.8%. For variations in the speed of movement of nodes, 20 m/s has the best performance, while 5 m/s has the worst performance.


2019 ◽  
Vol 14 (1) ◽  
pp. 21-38
Author(s):  
Omar A. Hammood ◽  
Mohd Nizam ◽  
Muamer Nafaa ◽  
Waleed A. Hammood

Video streaming in Vehicular Ad Hoc Networks (VANETs) is a fundamental requirement for a roadside emergency and smart video surveillance services. However, vehicles moving at a high speed usually create unstable wireless links that drop video frames qualities. In a high-density network, network collision between vehicles is another obstacle in improving the scalability of unicast routing protocols. In this paper, the RElay Suitability-based Routing Protocol (RESP) which makes a routing decision based on the link stability measurement was proposed for an uninterrupted video streaming. The RESP estimates the geographic advancement and link stability of a vehicle towards its destination only in the small region. To ensure the reliability while extending the scalability of routing, the relay suitability metric integrates the packet delay, collision dropping, link stability, and the Expected Transmission Count (ETX) in the weighted division algorithm, and selects a high-quality forwarding node for video streaming. The experimental results demonstrated that the proposed RESP outperformed the link Lifetime-aware Beacon-less Routing Protocol (LBRP) and other traditional geographical streaming protocols in providing a high packet delivery ratio and less packet delay with various network densities, and proved the scalability support of RESP for video streaming.


Author(s):  
D. Sivamurugan ◽  
L. Raja

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.


Mobile Ad Hoc Network (MANET) is a highly popular wireless network technology due to the proliferation of wireless devices. The characteristic of mobile ad hoc network is described as wireless links and open medium, centralized decision making, dynamic topology, limited power supply, bandwidth constraint and no predefined boundary. Due to its unique characteristics, this technology has been used to support communications in situations where it may be impossible to deploy infrastructure networks, such as military battlefields, disaster recovery sites and medical emergency situations. However, they appear to be susceptible to a variety of attacks than any other networks. The nodes of a MANET communicate with each other with the help of intermediate nodes. Each node of a network act as a host as well as a router. Efficient routing protocols have been developed to support the functionality of each node. These protocols trust that all the nodes are cooperative and well behaved. But some nodes act as a malicious node and launch various attacks on routing protocols. Mainly sinkhole attack affects the routing functionality of the network. Therefore, route inference-based attack detection has been proposed to handle the sinkhole attack in the networks. The proposed system computes the weight value by considering route factor, flow factor and sink factor. Based on the weight value, a malicious node is identified. The experiment results indicate that, the proposed system achieved a packet delivery ratio of 99.6% and throughput of 2700 kbps.


Sign in / Sign up

Export Citation Format

Share Document