Open Access Open Access  Restricted Access Subscription Access

Secure Analysis of Routing Protocol under Wormhole for MANET

K. Thamizhmaran

Abstract


The solutions may not always be sufficient, as ad hoc networks have their own vulnerabilities that cannot be addressed by these solutions. A few malicious nodes claim to be moderate nodes of a course to a few given objections, drop any packet that consequently goes through it, is one of the significant kinds of attack. We introduce an analysis method to detect malicious nodes in MANETs. The mechanism is cooperative were the protocol work cooperatively together so that they can analyze, detect malicious nodes in a reliable manner. We verify our method by running simulations with mobile nodes using Ad-hoc on-demand Distance Vector (AODV) routing, Dynamic Source Routing (DSR), Optimized Link State Routing Protocol (OLSR) and Destination-Sequenced Distance-Vector Routing (DSDV) on comparison with each other performance. It is seen that the malicious node detection rate is excellent; the overhead detection rate is low, packet delivery proportion is little bit high and furthermore the response time is observed when there is a change of mobility speed.


Full Text:

PDF

References


Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.

Krishnamoorthy, T., & Arivazhagan, A. D. (2015, January). Energy efficient routing protocol with ad hoc on-demand distance vector for MANET. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.

Thamizhmaran, K., Arivazhagan, A. D., & Anitha, M. (2015, January). Co-operative analysis of proactive and reactive protocols using Dijkstra's Algorithm. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.

Vennila, K., & Thamizhmaran, K. (2017). Implementation of Multilevel Thresholding on Image using Firefly Algorithm. International Journal of Advanced Research in Computer Science, 8(3).

Roy, A., & Deb, T. (2018). Performance comparison of routing protocols in mobile ad hoc networks. In Proceedings of the International Conference on Computing and Communication Systems (pp. 33-48). Springer, Singapore.

Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.

Thamizhmaran, K., Anitha, M., & Nachiappan, A. (2017). Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm. International Journal of Mobile Network Design and Innovation, 7(2), 88-100.

Thamizhmaran, K. (2020). Acknowledgement based Topology Control using Hybrid Cryptography for MANETS. i-Manager's Journal on Information Technology, 9(2), 36.

Thamizhmaran, K. (2020). CLUSTER BASED DATA COLLECTION SCHEME FOR VANET. Journal on Software Engineering, 14(4).

Pushpavani, R., Thamizhmaran, K., & Ravichandran, T. (2017). Fast Handover Algorithm for Mobility Management in VANETs. International Journal of Advanced Research in Computer Science, 8(3).


Refbacks

  • There are currently no refbacks.