CFP last date
20 January 2025
Reseach Article

Mobile Node Dynamism using Particle Swarm Optimization to fight against Vulnerability Exploitations

by Subburaj.v, K. Chitra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 13
Year of Publication: 2012
Authors: Subburaj.v, K. Chitra
10.5120/5598-7850

Subburaj.v, K. Chitra . Mobile Node Dynamism using Particle Swarm Optimization to fight against Vulnerability Exploitations. International Journal of Computer Applications. 41, 13 ( March 2012), 1-4. DOI=10.5120/5598-7850

@article{ 10.5120/5598-7850,
author = { Subburaj.v, K. Chitra },
title = { Mobile Node Dynamism using Particle Swarm Optimization to fight against Vulnerability Exploitations },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 13 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number13/5598-7850/ },
doi = { 10.5120/5598-7850 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:28.705640+05:30
%A Subburaj.v
%A K. Chitra
%T Mobile Node Dynamism using Particle Swarm Optimization to fight against Vulnerability Exploitations
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 13
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Gateway in Mobile Adhoc networks used to connect intermediate and neighboring nodes of MANET. In this way of classifying nodes based on its arrangement, each and every node depends upon other nodes for packet transmission and acknowledgement. The vulnerabilities arise in the form of attack further leads to web exploits and other notable attacks (worm hole and its exploits) arise from a node in a network. In this paper, we have proposed a strategy for node dynamism for implementing PSO based accessing mechanism to get rid of attack exploitation for every node in the network. In Node dynamism each and every node were configured with PSO based fitness function, which will reflect on its gateway to avoid various attack like worm hole attack and web exploits etc. To avoid this type of attack, an external node (source of attack inspiration to mislead the transformation) when involved in the Mobile attack has to be configured with node dynamism. This node dynamism also reflect on inside attack (a node knows the best route for an attack) fight against it. The need for node dynamism also ensures node efficient performance measures using rule based detection of individual node.

References
  1. Gautam Das, M. Fazio, Vulnerabilities of Internet Access Mechanism from Mobile Adhoc Networks, IEEE Proceeding 2006.
  2. Kennedy J, Eberhart RC, "Particle Swarm Optimization," In: Proceeding of the IEEE Int. Conf. Neural Networks: 1942-1948, 1995.
  3. Zhao Chang, Wang Wei-ping, "An Improved PSO – Based Rule Extraction Algorithm for Intrusion Detection, Proceeding of IEEE Computer Society.
  4. . Chen Guolong, Chen Qingliang and Guo Wenzhong, " A PSO-Based Approach to Rule Learning in Network Intrusion Detection," Fuzzy informationand Engineering (ICFIE), ASC 40, pp. 666-673, 2007.
  5. . S. Buchegger and J. L. Boudec. Performance analysis of the confidant protocol, cooperation of nodes – fairness in dynamic adhoc networks. In Proc of MobiHOC, june 2002
  6. S. Buchegger and J. L. Boudec. The effect of rumor spreading in reputation systems for mobile ad hoc networks. In Proc. Of WiOpt'03, March 2003.
  7. . S. Buchegger and J. -Y. L. Boudec. Coping with false accusations in misbehavior reputation systems for mobile ad hoc networks. Technical Report IC/2003/31, EPFL, 2003.
  8. . S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255–265, 2000.
  9. . Junqi Zhang, Kun Liu , Ying Tan, and Xingui He, "RANDOM BLACK HOLE PARTICLE SWARM OPTIMIZATION AND ITS APPLICATION" IEEE Int. Conference Neural Networks & Signal Processing, Zhenjiang, China, June 8~10, 2008.
  10. . J. J. Liang, A. K. Qin, P. N. Suganthan and S. Baskar, "Comprehensive learning particle swarm optimizer for global optimization of multimodal functions," IEEE Trans. on Evolutionary Computation, vol. 10, 2006, pp. 281-296.
  11. . L. N. de Castro, "Learning and Optimization Using the Clonal Selection Principle" IEEE Transactions on Evolutionary Computation, Vol. 6, 2002, pp. 239-251.
  12. . R. Stoleru, H. Wu, H. Chenji , Secure Neighbor Discovery in Mobile Ad Hoc Networks, 2011 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
  13. . http://www. codecogs. com/latex/eqneditor. php used in this paper for creating online equations with LATEX.
  14. Dasgupta D, Gonzalez FA, "An Intelligent Decision Support System for Intrusion Detection and Response," MMM-ACNS, Lecture Notes in Computer Science, 2052:1–14, 2001.
  15. Chittur A. , Model Generation for an Intrusion Detection System Using Genetic Algorithms
Index Terms

Computer Science
Information Sciences

Keywords

Node Dynamism Pso Ids Intelligent Node