Harmony Search Algorithm to Prevent Malicious Nodes in Mobile Ad Hoc Networks (MANETs)

2016 ◽  
Vol 15 (3) ◽  
pp. 84-90 ◽  
Author(s):  
Ahmed Mohammed Fahad ◽  
Ravie Chandren Muniyandi
2018 ◽  
Vol 11 (2) ◽  
pp. 309-340 ◽  
Author(s):  
Abdesselem Beghriche ◽  
Azeddine Bilami

PurposeSecurity is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.Design/methodology/approachThe proposed model incorporates the concept of trust into the MANETs and applies grey relational analysis theory combined with fuzzy sets to calculate a node’s trust level based on observations from neighbour nodes’ trust level, these trust levels are then used in the routing decision-making process.FindingsIn order to prove the applicability of the proposed solution, extensive experiments were conducted to evaluate the efficiency of the proposed model, aiming at improving the network interaction quality, malicious node mitigation and enhancements of the system’s security.Originality/valueThe proposed solution in this paper is a new approach combining the fundamental basics of fuzzy sets with the grey theory, where establishment of trust relationships among participating nodes is critical in order to enable collaborative optimisation of system metrics. Experimental results indicate that the proposed method is useful for reducing the effects of malicious nodes and for the enhancements of system’s security.


Author(s):  
SK. JASMINE ◽  
CH. SUBBARAO ◽  
P. BABU

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naı¨ve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naı¨ve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics


2013 ◽  
Vol 3 (2) ◽  
pp. 06-11
Author(s):  
Haboub Rachid ◽  
Dr. Mohammed Ouzzif

Mobile Ad-hoc Networks (MANETs) can be deployed quickly without any existing infrastructure. These networks are useful in many areas, such as emergency assistance, disaster relief, intelligent systems houses, patient monitoring, industrial applications, health monitoring, environmental control, military applications, etc. However ad-hoc networks face many challenges, such as the unpredictable mobility of the network, the limited amount of energy available, security challenges, low computational resources, low memory, etc. There is a need for routing approaches aware of those challenges. Thus, this work aims to provide a secure and context aware ad-hoc network, by changing the frequency of data transmission and routing the packets through reliable links. The proposed approaches has been tested, the results shows an interesting decrease of the transmission throughput coming from malicious nodes, a decrease in the packet loss and an increase of the network lifetime.


Sign in / Sign up

Export Citation Format

Share Document