A Dynamic Reputation-Based Incentive Scheme to Encourage Selfish Nodes in Post-Disaster Situation Using Delay-Tolerant Network

Author(s):  
Chandrima Chakrabarti

Modern communication infrastructures that usually keep people always on-line and inform “on-the-go” have repeatedly proved to be unreliable and unavailable during and after major disasters. In those situations the prime need is to quickly re-establish minimal communication infrastructures to start rescue operations. DTN is described by a special kind of mobile ad-hoc network where sparseness, large communication delay and lack of end to end path from source to destination exist. It is evident from this fact that data forwarding is dependent on the cooperation of multiple hops in “store-carry-forward” manner. However, nodes involved in communication may sometimes behave maliciously and may non-cooperate. So, the objective in this perspective is to develop a reliable data forwarding scheme by detecting malicious activities and encourage nodes to participate in Post Disaster Communication environment. Analysis of the proposed system, its protocols and performance studies are implemented and tested using Opportunistic Network Environment (ONE) simulator.

2019 ◽  
Vol 8 (4) ◽  
pp. 5327-5330

MANETs is a network which has nodes. Communication is done without use of infrastructure. Quality based routing is developed which considers end to end qualitatiove data communication. A number of protocols were designed and suggested by researchers to achieve effective communication in MANETs. Considering number of quality factors as energy, trust, bandwidth etc a number of protocols are existing. But still there are number of factors those can consider to enhance the performance of the protocols used for the communication purpose. The existing schemes were effective enough but still as factors those were considering only the resources held by a node not the physical factors were present as node is to survive and communication in network. So further enhancements were possible by considering the physical parameters. Inspired from that in this paper a proposed scheme considering physical factor name as Distance is considered as the improvement to the traditional scheme. The distance factor is behaving as finding the physical presence of the node in the network also the distance factor will help to find the appropriate node for the next hop to communicate. A simulation is conducted in MATLAB software and performance factors as throughput and energy are analyzed, also an comparison with existing system is done and the results shows that the proposed scheme is effective enough to achieve QOS based routing with reduced energy consumption and high throughput.


Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


Incessantly a self configuring network for mobile devices known as Mobile Ad hoc Network (MANET) are associated wirelessly .In significant networks, this design might perhaps enforce increased computational costs owing to the costly credentials chaining overheads that would not adapt for ad-hoc applications with increased nodes. Here a survey is carried out to express a view on the secure and authentic MANET systems. The literature reviewed is on different and diverse techniques of related to MANET systems. Reviews of 65 papers is presented and stated the significant analysis. At first the analysis depicts various attacks that are contributed in different papers. Subsequently ,various measures like security, cost, simulation time etc are also analyzed. It analyses the encryption method also that is exploited in each paper. This paper further gives an insight regarding the tools adapted ,chronological review and performance achievements in each case. At the end the review extended for the different research issues to investigate further research on secure and authentic MANET system


Vehicular Ad-hoc network a subclass of Mobile Ad-hoc network with various features providing Vehicle-to-Vehicle communication, Vehicle-to-RSU communication, Vehicle-to-Trusted Authority Communication. VANET is gaining higher attention now days both in industry and academic area and has become a trending research topic for research but still a lot of improvements is required in this area. Security of data is one of the major challenge in VANET. Encryption of data with the help of various encryption algorithms came up as solution for securing communication in VANET. But existing encryption algorithms used to secure VANET’s are complex due to which data are not delivered on time and face a lot of problems like privacy of data ,non-repudiation and cost (i.e. communication cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e. Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm. The objective of this hybrid approach is to perform double encryption on personal details for more privacy of personal data (using ECC and AES algorithm) and single encryption on safety messages (using AES algorithm) so safety messages are delivered on time and without any delay.


Author(s):  
Hussein Al-Bahadili ◽  
Azmi Halasa

In a Mobile Ad Hoc Network (MANET), a mobile node consumes its power in message communication, message processing, and other operation missions. The amount of power a mobile node consumes for communication is the highest and the dominant as compared to what a node consumes for other tasks. The power consumed in communication is proportional to the square of the nodes’ radio transmission range (R); therefore, minimizing R contributes to a significant reduction in power consumption and consequently increases node battery-power lifetime. This chapter presents a description and performance evaluation of a new efficient power conservation scheme, namely, the Location-Based Power Conservation (LBPC) scheme. It is based on the concept of reducing R by utilizing locally available nodes’ location information to adjust R according to one of the three proposed radius adjustment criteria: farthest, average, and random. So that instead of transmitting with full power to cover up to its maximum radio transmission range (Rmax), the transmitting node adjusts R to less than Rmax, which provides a power conservation factor equivalent to (R/Rmax)2.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Satyanarayana Pamarthi ◽  
R. Narmadha

PurposeNowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.Design/methodology/approachThis paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.FindingsIt observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.Originality/valueThis paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.


Sign in / Sign up

Export Citation Format

Share Document