scholarly journals Utilization of Energy Consumption Metric to Detect Black Hole Attacker in DSR Routing Protocol

2019 ◽  
Vol 8 (3) ◽  
pp. 6116-6120

A Mobile Adhoc Network (MANET) is a self-organized system comprised of multiple mobile wireless nodes. They do not require the existing network infrastructure. Autonomous telescopes can change freely and inadvertently in a network that can establish a dynamic network temporarily, and these networks can often change their appearance. Due to the openness in network topology and the absence of centralized administration in management, MANET is vulnerable to attacks from malicious nodes. Therefore, security is a major issue in MANET, which drastically reduces network performance. Several trust parameters such as packet delivery ratio, packet dropping ratio, etc are used for detecting the malicious node attack in MANET. Among these, this paper uses the energy as the trust parameter for detecting the malicious node. The energy reduction ratio differs from the normal node and attacker node in MANET. Hence, the main aim of this paper is to find the Normal Energy Reduction Ratio (NERR) and Attacker Energy Reduction Ratio (AERR). These two values are used for differentiating the normal node and attacker node in MANET. For routing, this paper uses the Dynamic Source Routing (DSR) Protocol.

2019 ◽  
Vol 17 (9) ◽  
pp. 696-700
Author(s):  
D. Muruganandam ◽  
J. Martin Leo Manickam

A MANET is an infrastructure-less type network, which consists of number of mobile nodes connected through wireless network interfaces. The Communication among nodes is made successfully when the nodes dynamically set up route among one another. The open nature and infrastructureless type of such networks causes the attacker's interest to penetrate through the network and decrease the network performance. Thus Security becomes a major concern for protected communication between mobile nodes. Packet misrouting stops the packet from reaching the destination by a malicious intermediate node. But the malicious node makes the intuition to its neighbors that it has done the genuine packet forwarding action. Moreover the malicious node makes the neighbours to suspect the normal node as malicious one. The proposed work ensures the detection of malicious nodes and avoids suspecting the trustworthy.


2021 ◽  
Author(s):  
Rahul Johari ◽  
Tanvi Gautam

Abstract Natural calamities leave people helpless by arising several situations such as network breakdown, zero communication, intermittent connectivity, dynamic network topology. In such situation an application of dynamic and intermittent routing scheme is essential to make further communication possible during likewise scenarios. An application of TCP/IP becomes futile in mentioned circumstances as it best works for static nodes and pre-defined network topology wherein source and destination nodes are first establishing the communication link with each other. An alternative measure of such hitches is to encounter an application of DTN protocol which possess all characteristics to withstand in such scenarios such as; dynamic network topology, intermittent connectivity, frequent path breaks, store – carry – forward fashion. In this paper we did thorough investigation of forest fire dataset (Uttarakhand) after exploring its implementation in ONE with Epidemic, Prophet, Spray and Wait, HBPR, GAER respectively. An extensive and thorough investigation for real world traces implementation has been done with OppNet routing protocols against mobility models namely; Shortest path map – based, Random Direction, Random Walk, Random Waypoint, Cluster Movement respectively for network performance metrics namely packet delivery ratio, packet overhead ratio and average latency ratio respectively with the application of K means clustering machine learning algorithm. With the help of this analysis, we explore the real-world traces characteristics and study the areas on which network performance can be improved.


2018 ◽  
Vol 26 (3) ◽  
pp. 25-36
Author(s):  
Deo Prakash ◽  
Neeraj Kumar ◽  
M.L. Garg

Mobile Adhoc Network (MANET) is a dynamic network without any centralized control. Due to frequent topological change, routing has been always a challenging task in these networks. This article presents optimized routing for efficient data dissemination in MANETs to meet the fast-changing technology of today's world. A novel metric for such optimized routing in MANET is proposed. The main parameters considered to evaluate this metric are the energy consumed during the communication, link stability, Packet Delivery Ratio (PDR) and traffic. The concept is based on a scenario in which a mobile node (source) sends data packets to another mobile node (destination) through its dynamically connected neighboring nodes. The path which consumes the lowest energy and also shows highest link stability is selected for consideration. In case the paths consume the same amount of energy, the highest stable path is chosen. In this manner, the most optimized path is selected. The authors' routing approach shows more efficiency than earlier in dissemination of data and information over the Mobile Ad-Hoc Networks.


2018 ◽  
Vol 7 (3) ◽  
pp. 86-90 ◽  
Author(s):  
S. Vasundra ◽  
D. Venkatesh

Wireless networks are comprised of nodes which are high in mobility and are adhoc natured where centralized access point is not required. Each node will have particular transmission range in which the data transmits from source to destination in that transmission range. Route construction for transmission of data from source to destination is tough due to high node mobility and dynamic nature of network. Many routing protocols are proposed and implemented in networks to reduce such mobility and dynamic difficulties for route construction. These routing protocols construct a route from source to destination based on availability of network nodes. Adhoc On demand Distance vector (AODV) is a self-starting dynamic network, Dynamic source routing (DSR) and Temporally Ordered Routing Algorithm (TORA) are most frequent used ones for dynamic route construction. Voice and Video are two mostly used applications nowadays as the users are immensely using them. In this paper, a comparison is made in performances of AODV, DSR and TORA for the traffics of voice and video. The performance is evaluated in terms of delay, throughput and packet delivery ratio. Simulations are conducted using network simulator NS 2.35.


Author(s):  
D. Sivamurugan ◽  
L. Raja

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.


2019 ◽  
Vol 8 (2) ◽  
pp. 5799-5805

Cloud networks are very widespread and unreliable because of the amount of VMs and presented nodes in their Virtual Cloud Network. Nodes might connect and revoke networks at any time. Resilience is a advantage of cloud computing, but it has many safety issues in routing and transmitting information between messages. VCN research is very similar to the portable ad-hoc network (MANET), which depends on the collaboration of all involved nodes to provide fundamental activities. Many safety assaults and risks exploit the safety of information transmission due to the decentralized environment in VCN and MANET. Malicious nodes can interfere and use information during wireless communications. Numbers of methods are there that has a diverse effect on such attacks for malicious nodes. Varied attacks are susceptible to security, but Black hole assault is one of the most common effective assaults, as fraudulent nodes dump all incoming emails reducing network performance and reliability. A black hole node is designed to lampoon every node in the network that conveys with some other node by saying it always has the easiest route to the target node. In this manuscript, a secure routing discovery method has been presented using Ad hoc on demand distance vector (AODV) routing protocol. For the detection of attack in the cloud, the concept of Artificial Intelligence (AI) has been used. Therefore, in this research, Artificial Neural Network (ANN) and Support Vector Machine (SVM)is adapted to determine Packet Delivery Ratio (PDR), Delay and Throughput measures. The comparative examination has been conducted to depict the proposed FNN-AODV effectiveness. There is an enhancement of 61.01% in FNN-AODV and 5.08% enhancement in Throughput in proposed FNN-AODV than R-AODV, 6.26% enhancement in PDR for FNN-AODV than R-AODV and 10.8% is the decrement in delay in FNN-AODV than of R-AODV


Author(s):  
Gurpreet Singh, Ganpat Joshi

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


2018 ◽  
Vol 7 (3.1) ◽  
pp. 31
Author(s):  
Rohan Gupta ◽  
Gurpreet Singh ◽  
Amanpreet Kaur ◽  
Aashdeep Singh

Mobile adhoc network is a network which carries out discussion between nodes in the absence of infrastructure. The fitness function based Particle Swarm Optimization Algorithm has been projected for improving the network performance. The effect of changing the number of nodes, communication range and transmission range is investigated on various qualities of service metrics namely packet delivery ratio, throughput and average delay. The investigation has been carried out using NS-2 simulator.  


Author(s):  
Er. Ashu Garg ◽  
Sourav

Delay tolerant networks (DTNs), such as sensor networks with scheduled intermittent connectivity, vehicular DTNs that disseminate location-dependent information, and pocket-switched networks that allow humans to communicate without network infrastructure, are highly partitioned networks that may suffer from frequent disconnectivity. In DTNs, the in-transit messages, also named bundles, can be sent over an existing link and buffered at the next hop until the next link in the path appears. This message propagation process is usually referred to as the “store-carry-and-forward” strategy, and the routing is decided in an “opportunistic” fashion. We aim to evaluate the added effect of the presence of malicious nodes on ad hoc network performance, and determine appropriate measures to detect malicious nodes. A malicious node advertising itself as having a valid route to the destination. With this intension the attacker consumes or intercepts the packet without any forwarding. An attacker can completely modify the packet and generate fake information, this cause the network traffic diverted or dropped. Let H be a malicious node. When H receives a Route Request, it sends back a Route Reply immediately, which constructs the data and can be transmitted by itself with the shortest path. So S receives Route Reply and it is replaced by H->S. then H receives all the data from S. In this research we propose a new assesment based scheme for detection of Malicious Nodes in DTN. And examine different strategies for prevention to malicious nodes as well as Compare out come proposed scheme with the earliest established schemes.


Sign in / Sign up

Export Citation Format

Share Document