scholarly journals Congestion Control Through IDA Process for Malicious Node in MANETs

2020 ◽  
Vol 8 (6) ◽  
pp. 1227-1230

Mobile Ad Hoc Network is an array of mobile networks that connect without a base station with each other. The networks are automatically established or on request when certain nodes come into the shared mobility region and agree to collaborate for the transmission and exchange of data. Because of its deployment nature, MANETs are more vulnerable to different type of attack. The reliability of the ad hoc mobile network is difficult due to its essential features including complex topology, a flexible format, limited power, limited bandwidth and remote communication. Mechanisms for protection such as encryption or authentication cannot alone identify harmful nodes in ad-hoc networks. Therefore, we propose and implement the Congestion control through Intrusion Detection Approach (IDA), this intrusion detection approach designed specifically for MANET. This tool can be used even in the case of incorrect wrongdoing reports to identify fraudulent nodes. This approach can identify extremely dangerous nodes, and thus improves protection and network efficiency, relative to other detection methods.

Mobile Ad hoc Network (MANET) is essentially a framework much less network. It carries out certainly not demand any kind of predetermined network. Every nodule is serving as a recipient and also a transmitter. All the nodules in the MANET are essentially taken on as functioning within a welcoming as well as collaborative network circumstance. There is essentially no base station to handle the relocating gadgets. There is essentially no safety to guard the nodules. Any kind of nodule may function as a misbehaving nodule. Such uncooperative habits may significantly diminish network efficiency as well as might also cause complete interaction failure. The destructive nodules may effortlessly assault the mobile nodules. In this particular newspaper, our experts have essentially suggested an Intrusion Detection System through which the harmful nodules are essentially spotted and also certainly there due to the functionality of the network are going to be essentially raised.


Author(s):  
Geoffrey Tyolaha ◽  
Moses Israel

In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach. The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way. This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Inam Ullah Khan ◽  
Muhammad Abul Hassan ◽  
Mohammad Dahman Alshehri ◽  
Mohammed Abdulaziz Ikram ◽  
Hasan J. Alyamani ◽  
...  

In recent decades, the Internet of flying networks has made significant progress. Several aerial vehicles communicate with one another to form flying ad hoc networks. Unmanned aerial vehicles perform a wide range of tasks that make life easier for humans. However, due to the high frequency of mobile flying vehicles, network problems such as packet loss, latency, and perhaps disrupted channel links arise, affecting data delivery. The use of UAV-enabled IoT in sports has changed the dynamics of tracking and working on player safety. WBAN can be merged with aerial vehicles to collect data regarding health and transfer it to a base station. Furthermore, the unbalanced energy usage of flying things will result in earlier mission failure and a rapid decline in network lifespan. This study describes the use of each UAV’s residual energy level to ensure a high level of safety using an ant-based routing technique called AntHocNet. In health care, the use of IoT-assisted aerial vehicles would increase operational performance, surveillance, and automation optimization to provide a smart application of flying IoT. Apart from that, aerial vehicles can be used in remote communication for treatment, medical equipment distribution, and telementoring. While comparing routing algorithms, simulation findings indicate that the proposed ant-based routing protocol is optimal.


Sign in / Sign up

Export Citation Format

Share Document