Reduction of Malicious Nodes using RRT and Clustering in Mobile Ad hoc Network

Author(s):  
Zulfekar Ahmad ◽  
Akhilesh Bansiya

Mobile Ad-hoc Network is a collection of wireless mobile node, consists of each wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node. IDS can be well-defined as the protector system which self-detects malicious activities within a network, and thus generates an alarm to alert the security device at a locality if intrusions are considered to be illegal on that network or host. There me many approach to classify IDS. In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network.

Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


Author(s):  
Kaushal Kishor ◽  
Parma Nand ◽  
Pankaj Agarwal

Mobile ad hoc Network is infrastructure less wireless network and decentralized way, and then for a large network number of nodes dynamically therefor the connection established between source node to destination node is really challenging. The challenge is interconnecting ad hoc network to the internet seems from the needs to inform ad hoc nodes about available gateways in an extremely challenging scenario while a making a minimum consumption of the source network resources. Then an efficient gateway discovery of an ad hoc network becomes one of the central factors to enable the economic consumption of hybrid ad hoc network in future mobile and wireless network. In mobile ad hoc network have multihop nature of MANET therefore several reachable gateways for mobile node at any period of time. If the mobile node receives gatways advertisement from more than one gateway. It has to determine which gateway to use for connecting to the net. Most existing protocol choose the gateway which is closer in terms of the number of physical hops. This paper has focused on design an efficient and adaptive subnetting hybrid gateway discovery mechanism on the basis of dynamic TTL value adjustment such that congestion and unnecessary overhead is reduced. Selecting the gateway on the basis of one and two parameters will increase the performance and throughput of the network. The main objective of adaptive gateway discovery to determine the optimal TTL value in terms of number of hops to determine the proactive area, nodes outside this area follow the reactive approach. Consequently, for achieving a good trade off between performanceand network operating expense. 


2018 ◽  
Vol 33 (4) ◽  
pp. 357-378 ◽  
Author(s):  
Luong Thai Ngoc ◽  
Vo Thanh Tu

Ad hoc On-demand Distance Vector (AODV) routing protocol is one of the most popular reactive protocol used for Mobile Ad hoc Network, is target of many attack types. Some research works published related to improve of AODV based on digital signature, typical as SAODV and ARAN. However, they have some weakness, malicious can pass over security wall of SAODV by using fake keys, both of SAODV and ARAN can't detect wormhole nodes in hide mode. In additions, detection solutions based on characteristics of attack types have proposed, they only bring about efficiency for each independent type of attack and malicious nodes can join to the discovered route by deliberately giving fake information concerning. This article proposes a trust authentication mechanisms (TAM) using public-key cryptograms RSA and digital certificates (DC) based on X509 standard. TAM allows a mobile node authenticates preceding nodes by checking control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. Analysis results confirm that TAM can detect and prevent almost current routing protocol attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and participation mode Wormhole attacks. Specially, the simulation results in NS2 show that TAM can detect and prevent successful to 100\% malicious nodes using fake keys for all scenarios based on the number of UDP connections, 100% hide mode wormhole nodes for immobility scenarios and above 99% (the mistaken rate below 1.0%) for all mobility scenarios with 30m/s of maximum speeds and 1hop minimum tunnel length.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


2012 ◽  
Vol 11 (10) ◽  
pp. 3060-3064 ◽  
Author(s):  
Roopali Garg ◽  
Himika Sharma

Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one attack which is very dangerous called Sybil attack. In Sybil attack, attackers or malicious nodes uses multiple identities to disrupt the communication between the nodes by capturing necessary and important information and creating misunderstandings between the nodes. In this paper some measures are described to prevent Sybil attack.


2019 ◽  
Vol 16 (9) ◽  
pp. 3906-3911
Author(s):  
Karan Singh ◽  
Rajeev Gupta

Recent progression in the field of information and communication cause increase of packet count over the World Wide Web network. These communicated packets should deliver on time from origin node to destination node using a reliable and shortest route. In this way routing plays an important part in dispatching the packets to destination form the source. This routing becomes more crucial when packets delivery is done in independent mobile nodes which dynamically form a temporary network. This network named as Mobile Ad-Hoc Network and therefore it is said to be particular reason-specific, self-ruling and dynamic. In this paper we analyzed 3 protocols and for a quality of service (i.e., Packet Delivery Ratio) and achieved comparative study of various protocols of routing with respect to Operation of protocols, Route maintenance, Routing table, Route, Route selection, Routing structure, Routing Approaches, Protocol types, Merits and Demerits.


Sign in / Sign up

Export Citation Format

Share Document