Open Access Open Access  Restricted Access Subscription Access

Wireless Ad hoc Reactive Routing Protocols in Mobile Ad hoc Networks

K. Thamizhmaran

Abstract


Mobile Adhoc Networks (MANETs) need scalable, dependable, and efficient routing. Most significantly, each node in the MANETs can function as both a transmitter and a receiver within its communication range. Because of their high level of security, self-organization, and speed of deployment, they can access data and services from any location using dynamic routing. Among the different air communication technologies, MANETs are important because they have mobile nodes that can be randomly connected via wireless links. Every node in the network functions as a router and keeps track of routes to other nodes. To stop attackers from faking acknowledgement packets, Enhanced Adaptive 3 Acknowledgment (EA3ACK) was introduced. According to recent research, a novel intrusion detection system called EA3ACK uses Secure Hybrid Shortest Path (SHSP) Routing in conjunction with EAACK (DSA) and is specifically made for MANETs in order to minimize end-to-end latency. With the help of the secure hybrid shortest path routing algorithm, the ACK technique is used to prevent all forms of network attacks. In addition to preventing packet loss and delay, it also speeds up nodes. The suggested approach is implemented in the test system and simulated using Network Simulator (NS2).


Full Text:

PDF

References


Anand Patwardhan and Iorga, Secure routing and Intrusion Detection in Ad-hoc networks, in Proc. 3rd Int. Conf. Pervasive Computer Communication, pp.191–199, (2005).

Balakrishnan, et al, TWOACK: preventing selfishness in mobile ad hoc networks, Proc. Int. Conf. on Wireless Communications and Networking, vol.4, no.10, pp. 2137-2142, (2005).

Jongoh Choi, et al, Malicious Nodes Detection in AODV- Based Mobile Ad Hoc Networks, GESTS Trans. Comp. Science and Engg, vol.18, no.1, pp.49-55, (2005).

Liu, et al, An acknowledgment-based approach for the detection of routing misbehaviour in MANETs, IEEE Trans. Mobile Comput., vol.6, no.5, pp.536–550, (2007).

Aishwarya Sagar and Meenu Chawla, Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET, IJCSI, vol.7, iss.4, no.1, pp.12-17, (2010).

K. Sahadevaiah, et.al, Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks, in Proc. 3rd Int. Conf. Network Protocols and Algorithms, vol.3, no.4, pp.122-128, (2010).

Prabu, K. and Subramani, A. Performance comparison of routing protocol in MANET, Int. J. of Adv. Research in Com. Sci. and Soft Engg., Vol. 2, No. 9, pp.388–392, (2012).

Shakshuki, et al, EAACK — A Secure Intrusion: Detection System for MANETs, IEEE Trans on industrial electronics, vol. 60, no. 3, pp. 1089-1098, (2013).

Prabu, K. and Subramani, A. Energy efficient routing in MANET through edge node selection using ESPR algorithm, Int. J. Mobile Network Design and Innovation, vol. 5, no. 3, pp.166–175, (2014).

Abdulsalam Basabaaa, et al, Implementation of A3ACKs intrusion detection system under various mobility speeds, in Proc. 5th Int. Conf. on Ambient Systems, Networks and Technologies, pp.571-578 (2014).


Refbacks

  • There are currently no refbacks.