scholarly journals Malicious Node Detection on Routing Via Certificate Authority and Optimal Fuzzy for Wireless Ad-Hoc Network

2019 ◽  
Vol 8 (3) ◽  
pp. 1761-1769

Wireless Ad-Hoc network has a set of nodes which designed with wireless transceivers. These nodes communicate with each other by accessing the common channel. In the ad-hoc network, security is one of the main challenges. Due to the behavior of malicious nodes, the security of the network is compromised. So, the major objective of this paper is to improve the security of the network by combining both malicious node detection and cryptography techniques. In this paper, an optimized fuzzy system is presented for the detection of malicious nodes which are malfunctioning in the routing path between source and destination. To optimize the performance of the fuzzy system, Particle Swarm Optimization (PSO) algorithm is presented. After the detection of malicious nodes, each normal behavior node in the network is authenticated by the Certificate Authority (CA). Then the authenticated nodes transmit the data packets to the destination with the Elliptic Curve Cryptography (ECC) algorithm. Simulation results show that the performance of the optimized fuzzy system is improved than that of the conventional fuzzy system for malicious node detection in terms of delivery ratio, detection time and energy efficiency

Mobile Ad hoc Network (MANET) is essentially a framework much less network. It carries out certainly not demand any kind of predetermined network. Every nodule is serving as a recipient and also a transmitter. All the nodules in the MANET are essentially taken on as functioning within a welcoming as well as collaborative network circumstance. There is essentially no base station to handle the relocating gadgets. There is essentially no safety to guard the nodules. Any kind of nodule may function as a misbehaving nodule. Such uncooperative habits may significantly diminish network efficiency as well as might also cause complete interaction failure. The destructive nodules may effortlessly assault the mobile nodules. In this particular newspaper, our experts have essentially suggested an Intrusion Detection System through which the harmful nodules are essentially spotted and also certainly there due to the functionality of the network are going to be essentially raised.


2019 ◽  
Vol 8 (3) ◽  
pp. 6554-6562

Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed infrastructure, where each node plays a role of the router. There are not any centralize control to handle the routing process of network, due to the dynamic tropology and infrastructure less network the network is vulnerable to various kinds of attacks. Therefore, numerous proactive, reactive and hybrid routing protocols have been recommended, among which one of the well-known a protocol is AODV due to its high-performance gain. This research work contributes towards mitigating network layer attacks on routing protocols in Wireless Ad hoc Networks. Problem and it's security issues because its consequences and existing mechanisms for detection and prevention with the context of AODV protocol is a challenge in Wireless Ad hoc Network, particularly in MANET and Sensor network. We present an AODV based secure routing algorithm for detection and prevention of different network layer attacks such as blackhole and rushing attacks. We use different types of security parameters like node sequence numbers, hop count, trust value, path value, acknowledge time, the threshold value and ALERT packet message to design a secure algorithm for AODV routing protocol. It shows enactment evaluation of AODV with the enhanced secure routing algorithm and existing routing algorithm through simulations which will confirm the effectiveness and accuracy of the algorithm by considering performance metrics like throughput, packet delivery ratio and end to end delay. Using network simulator NS-2.35 the experimental results have been shown an improvement in throughput, packet delivery ratio (PDR), and end to end delay using IDSAODV and results are compared with normal AODV routing protocol for blackhole and rushing attacks. The comparative results have been also shown with proposed IDSAODV and existing method


Author(s):  
Gopalakrishnan Subburayalu ◽  
Hemanand Duraivelu ◽  
Arun Prasath Raveendran ◽  
Rajesh Arunachalam ◽  
Deepika Kongara ◽  
...  

2018 ◽  
Vol 14 (1) ◽  
pp. 16
Author(s):  
Sijjad Ali Khuhro ◽  
Haiyang Yu ◽  
Muhammad Azeem ◽  
Allah Ditta ◽  
Khurram Gulzar Rana ◽  
...  

2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


Author(s):  
A. S. M. Muntaheen ◽  
Milton Chandro Bhowmick ◽  
Md. Raqibul Hasan Rumman ◽  
Nayeem Al-Tamzid Bhuiyan ◽  
Md. Taslim Mahmud Bhuyain ◽  
...  

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.


Mobile Ad Hoc Network (MANET) is a highly popular wireless network technology due to the proliferation of wireless devices. The characteristic of mobile ad hoc network is described as wireless links and open medium, centralized decision making, dynamic topology, limited power supply, bandwidth constraint and no predefined boundary. Due to its unique characteristics, this technology has been used to support communications in situations where it may be impossible to deploy infrastructure networks, such as military battlefields, disaster recovery sites and medical emergency situations. However, they appear to be susceptible to a variety of attacks than any other networks. The nodes of a MANET communicate with each other with the help of intermediate nodes. Each node of a network act as a host as well as a router. Efficient routing protocols have been developed to support the functionality of each node. These protocols trust that all the nodes are cooperative and well behaved. But some nodes act as a malicious node and launch various attacks on routing protocols. Mainly sinkhole attack affects the routing functionality of the network. Therefore, route inference-based attack detection has been proposed to handle the sinkhole attack in the networks. The proposed system computes the weight value by considering route factor, flow factor and sink factor. Based on the weight value, a malicious node is identified. The experiment results indicate that, the proposed system achieved a packet delivery ratio of 99.6% and throughput of 2700 kbps.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


Sign in / Sign up

Export Citation Format

Share Document