Open Access Open Access  Restricted Access Subscription Access

Network Security Attacks for Temporary Wireless Networks using Hybrid Routing Protocol

Prof. K. Thamizhmaran

Abstract


These IDS solutions might not always be sufficient because they are unable to address the vulnerabilities that ad hoc networks naturally present. One of the primary forms of assaults in the network is un-forward capacity nodes, which pose as intermediary nodes on a route to certain targets and drop any packet that passes through them. Because of the cooperative nature, the protocol collaborates to reliably identify and evaluate hostile nodes. In this research, they propose black-hole assaults as an analysis approach to detect malicious nodes in MANETs. Using mobile nodes and the hybrid routing protocol Modified-Zone based Hierarchical Link State (M-ZHLS), we ran Network Simulations 2 (NS2) to validate our created strategy. When there is a change in mobility speed and fluctuating topology size, it is discovered that the black hole and malicious node detection rate is very good, with reduced average latency and enhanced packet delivery ratio when compared to the Zone based Hierarchical Link State (ZHLS) routing protocol.


Full Text:

PDF

References


Chatterjee, et.al (2002) “A Weighted Clustering Algorithm for Mobile Ad Hoc Networks”, Vol. 5, No. 2, pp. 193-204.

Jane et al, (2005) “A Survey of clustering schemes for MANET”, IEEE communication and surveys, Vol.7, No.1, pp.32-47.

Prabu, et al (2012) “Performance Comparison of Routing Protocol in MANET”, IJARCSSE, Vol-2, No. 9, pp. 388-392.

Swati, et.al (2014) “A Survey Routing Protocols in MANET”, IJCA, Vol.96, No.13, pp.7-12.

Pathak, et al (2014) “An improved cluster maintenance scheme for MANET”, In IEEE Conference on advances in computing, communications and informatics, pp. 2117–2121.

H. Wu, et al. “QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks”, Ad Hoc Networks, 2009, Vol. 5, No. 2, pp.600-612.

K.Thamizhmaran, et al. “Secure Routing Protocol in MANET – A Survey”, International Journal of Advance Research in Technologs”, 2012, Vol. 3, No. 3, pp.9-14.

K.Thamizhmaran, et al. “Authentication and Intrusion Detection in MANET”, International Journal of Advance Research in Technology, 2012, Vol. 3, No. 3, pp.15-21.

Shakshuki, et al. “EAACK - A Secure Intrusion Detection System for MANETs”, IEEE Trans.,2013, Vol. 60, No. 3, pp.1089-1098.

Prabu, K. and Subramani, A. “Energy efficient routing in MANET through edge node selection using ESPR algorithm”, Int. J. Mobile Network Design and Innovation, 2014, Vol. 5, No. 3, pp.166–175.


Refbacks

  • There are currently no refbacks.