CFP last date
20 December 2024
Reseach Article

Detecting and Predicting Malicious Nodes in Mobile Ad-hoc Networks using a Secure Technique

by Imran Khan, Pratik Gite
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 3
Year of Publication: 2022
Authors: Imran Khan, Pratik Gite
10.5120/ijca2022921988

Imran Khan, Pratik Gite . Detecting and Predicting Malicious Nodes in Mobile Ad-hoc Networks using a Secure Technique. International Journal of Computer Applications. 184, 3 ( Mar 2022), 15-19. DOI=10.5120/ijca2022921988

@article{ 10.5120/ijca2022921988,
author = { Imran Khan, Pratik Gite },
title = { Detecting and Predicting Malicious Nodes in Mobile Ad-hoc Networks using a Secure Technique },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 3 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number3/32313-2022921988/ },
doi = { 10.5120/ijca2022921988 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:32.144770+05:30
%A Imran Khan
%A Pratik Gite
%T Detecting and Predicting Malicious Nodes in Mobile Ad-hoc Networks using a Secure Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 3
%P 15-19
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Networking (MANET) is a rapidly growing area of interest in the realm of communication frameworks. Due to the fact that the MANET lacks a basis, it exhibits the dynamic character of a self-assertive network architecture. Security concerns are critical in these networks. Nodes in MANETs may launch a variety of assaults or become conspicuously self-centered in order to preserve their advantage. These nodes may be considered malicious. Identification of such malicious nodes is critical for the successful operation of MANETs. A collection of networks has been presented, but each one has its own set of constraints. The scope of this proposal is to do research on black hole, worm hole collaborative malevolent, and flooding attacks, and to establish a network of counteractive action by using responsive directing conventions. For execution analysis and replication, an AODV, NS-2 organized test network is used. To prevent black hole, worm hole collaboration malevolent, and flooding attacks, a countermeasure is used in which the Trust value is calculated based on the route request, route response, and information packet. Following the count, place stock in values ranging from 0 to 1. If the trust esteem is more than 0.5, the node is solid and permits access to the network as a whole. The suggested convention secure Ad hoc On-demand distance vector (SAODV) is evaluated in terms of network execution. When compared to the usual AODV convention, the result reveals execution change. By increasing the duration a dip in throughput, SAODV's throughput is superior to that of joint malicious assault AODV and current protocol. SAODV's packet delivery ratio is superior to that of joint malicious attack AODV and the established AODV protocol. SAODV's End to End Delay is superior than joint malicious attack AODV and the current AODV protocol.

References
  1. I. Mohd Zaki and H. Rosilah, “The implementation of Internet of Things using test bed in the UKMnet environment,” AsiaPacific Journal of Information Technology and Multimedia, vol. 8, no. 2, pp. 1–17, 2019.
  2. Z. Ismail and R. Hassan, “A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET,” in in the 17th Asia Pacific Conference on Communications, IEEE, 2011
  3. T. Salam and M. S. Hossen, “Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network,” Wireless Personal Communications, vol. 113, no. 1, pp. 189–222, 2020
  4. M. S. Hossen, “DTN routing protocols on two distinct geographical regions in an opportunistic network: an analysis,” Wireless Personal Communications, vol. 108, no. 2, pp. 839– 851, 2019.
  5. N. Khanna and M. Sachdeva, ‘‘BEST: Battery, efficiency and stability based trust mechanism using enhanced AODV for mitigation of blackhole attack and its variants in MANETs,’’ Adhoc Sensor Wireless Netw., vol. 46, nos. 3–4, pp. 215–264, 2020.
  6. R. Fotohi, E. Nazemi, and F. S. Aliee, ‘‘An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks,’’ Veh. Commun., vol. 26, Dec. 2020, Art. no. 100267.
  7. A. Nabou, M. D. Laanaoui, and M. Ouzzif, ‘‘New MPR computation for securing OLSR routing protocol against single malicious attack,’’ Wireless Pers. Commun., vol. 115, pp. 1–20, Nov. 2020.
  8. N. C. Singh and A. Sharma, ‘‘Resilience of mobile ad hoc networks to security attacks and optimization of routing process,’’ Mater. Today, Proc., 2020.
  9. M. Faraji-Biregani and R. Fotohi, ‘‘Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles,’’ J. Supercomput., vol. 76, pp. 1–28, Nov. 2020
  10. Z. Yusen, G. Jingjing, W. J. Shuang, S. Yan, Y. Li, and J. Xin, ‘‘Formal verification approach for false route in MANET,’’ Comput. Sci., vol. 39, no. 2, pp. 118–121, 2012
  11. V. Desai and N. Shekokar, ‘‘Performance evaluation of OLSR protocol in MANET under the influence of routing attack,’’ in Proc. IEEE Global Conf. Wireless Comput. Netw. (GCWCN), Dec. 2014, pp. 138–143
  12. B.-T. Xu, Q. Zhu, and H. Hu, ‘‘Analysis of connectivity in ad-hoc network based on interference and fading channel,’’ J. China Universities Posts Telecommun., vol. 19, no. 5, pp. 77–82, Oct. 2012
  13. Z. Gong and M. Haenggi, ‘‘Interference and outage in mobile random networks: Expectation, distribution, and correlation,’’ IEEE Trans. Mobile Comput., vol. 13, no. 2, pp. 337–349, Feb. 2014
  14. A. Adnane, C. Bidan, and R. T. D. Sousa, ‘‘Trust-based security for the OLSR routing protocol,’’ Comput. Commun., vol. 36, nos. 10–11, pp. 1159–1171, Jun. 2013
  15. R.-R. Yin, N. Zhao, and Y.-H. Xu, ‘‘An selective forwarding attack considered routing protocol for scale-free network,’’ in Proc. 12th Int. Symp. Commun. Syst., Netw. Digit. Signal Process. (CSNDSP), Jul. 2020, pp. 1–6.
  16. C. Li and H. Dai, ‘‘Connectivity of multi-channel wireless networks under jamming attacks,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 706–711.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networking AODV SAODV NS2 End to End Delay Packet Delivery Ratio Throughput