Open Access Open Access  Restricted Access Subscription Access

Secure Hybrid Model for Mobile Ad-hoc Networks

K. Thamizhmaran

Abstract


Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different wireless communication technologies, MANETs are important because they have mobile nodes that can be randomly coupled via wireless links. Every node in the network functions as a router and keeps track of routes to other nodes. To stop attackers from faking acknowledgement packets, Enhanced Adaptive 3 Acknowledgment (EA3ACK) was introduced. This study presents a novel intrusion detection system, EA3ACK, that reduces end-to-end delay in MANETs by combining Secure Hybrid Shortest Path Routing (SHSP) with EAACK (DSA). With the help of the secure hybrid shortest path routing algorithm, the ACK technique is used to prevent all forms of network attacks. In addition to preventing packet loss and delay, it also speeds up nodes. The suggested approach is implemented in the test system and simulated using Network Simulator (NS2). The proposed SHSP provides secure transmission and further reduces routing overhead, delay and packet loss since EA3ACK with SHSP algorithm increases efficiency of network topology.


Full Text:

PDF

References


Anand Patwardhan and Iorga, Secure routing and Intrusion Detection in Ad-hoc networks, in Proc. 3rd Int. Conf. Per-vasive Computer Communication, pp.191–199, (2005).

Balakrishnan, et al, TWOACK: preventing selfishness in mobile ad hoc networks, Proc. Int. Conf. on Wireless Com-munications and Networking, vol.4, no.10, pp. 2137-2142, (2005).

Jongoh Choi, et al, Malicious Nodes Detection in AODV- Based Mobile Ad Hoc Networks, GESTS Trans. Comp. Sci-ence and Engg, vol.18, no.1, pp.49-55, (2005).

Liu, et al, An acknowledgment-based approach for the detection of routing misbehaviour in MANETs, IEEE Trans. Mobile Comput., vol.6, no.5, pp.536–550, (2007).

Aishwarya Sagar and Meenu Chawla, Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET, IJCSI, vol.7, iss.4, no.1, pp.12-17, (2010).

K. Sahadevaiah, et.al, Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks, in Proc. 3rd Int. Conf. Network Protocols and Algorithms, vol.3, no.4, pp.122-128, (2010).

Prabu, K. and Subramani, A. Performance comparison of routing protocol in MANET, Int. J. of Adv. Research in Com. Sci. and Soft Engg., Vol. 2, No. 9, pp.388–392, (2012).

Shakshuki, et al, EAACK — A Secure Intrusion: Detection System for MANETs, IEEE Trans on industrial electronics, vol. 60, no. 3, pp. 1089-1098, (2013).

Prabu, K. and Subramani, A. Energy efficient routing in MANET through edge node selection using ESPR algorithm, Int. J. Mobile Network Design and Innovation, vol. 5, no. 3, pp.166–175, (2014).

Abdulsalam Basabaaa, et al, Implementation of A3ACKs intrusion detection system under various mobility speeds, in Proc. 5th Int. Conf. on Ambient Systems, Networks and Technologies, pp.571-578 (2014).


Refbacks

  • There are currently no refbacks.