scholarly journals Sinkhole Attack Detection and Prevention using Agent Based Algorithm

2021 ◽  
Vol 23 (05) ◽  
pp. 526-544
Author(s):  
Ashwini V. Jatti ◽  
◽  
Dr V. J. K. Kishor Sonti ◽  

This study presents sinkhole attack detection and prevention using agent-based algorithm. In this algorithm, agents are used to provide information to all node from its reliable neighbors by negotiation in three steps, thus nodes may not be able to pay the attention to the traffic made by sinkhole attacker. In this work, network scale of 500×500 m2 square areas have been considered. Series of simulation are carried in each experiment. Every simulation run is being organized to work for 10mins. Network performance is evaluated in terms of throughput, packet delivery ratio, jitter, delay in packets delivery, data packets received, data packets drop using network simulations software. Network simulation results depicts that in proposed algorithm, throughput increases by 15 to 20 percent, packet delivery ratio increases by 30 to 40%, decrease in the jitter by 10 to 15 %, delay in packets delivery is decreased by 15 to 20 %, data packets received are increased by 15 to 20 % and number of the data packets drop are decreased by 5 to 15 %. Based on simulation results throughput, packet delivery ratio and data packets received increased in proposed agent-based algorithm. However, it is observed that, jitter, delay in packets delivery and data packets drop were decreased.

2021 ◽  
Author(s):  
Anusha Chintam ◽  
A. Sra ◽  
T.V. Madhusudhan Rao

Abstract Wireless mesh network formed temporarily by using mobile hosts (nodes) without the help of any centralized and cooperate to dispatch the data packets through wireless links over the network. Due to this decentralization, each node act as both router as well as host for dispatching packets in the network. Because of a dynamic nature that is the mobility nature of the node in a network is vulnerable to various types of attacks. Some of the attacks are gray and black hole attacks. These attacks are advertised incorrect information regarding the shortest path to the sink node. This paper proposes a secure Dynamic Source Routing (SDSR) for providing a secure and safe route between the origin and sink nodes which identify and remove the gray and black hole nodes in the network. The proposed work is simulated by using the NS2 simulator tool and got the better performance for considered performance variables such as packet delivery ratio, throughput and node overhead. The simulation results give better performance compared to normal DSR and selfish DSR with increased packet delivery ratio and throughput and with decreased overhead of the network.


Author(s):  
Kamlesh Kumar Rana ◽  
Vishnu Sharma ◽  
Vishal Jain ◽  
Sanjoy Das ◽  
Gagan Tiwari ◽  
...  

Vehicular ad-hoc network (VANET) is an autonomous system of mobile vehicles in which vehicles are a source of information. In VANET, direct communication between vehicles provides high-level safety and hassle-free drive. Large moving vehicles such as trucks or buses may affect direct communication of vehicles as a nonline of sight (NLOS) may occur. NLOS restricts direct communication of vehicles. Even the corresponding vehicle is within the communication range of the communicating vehicle. To overcome the NLOS problem and verify the location of the vehicles, this chapter has presented a routing mechanism, namely Directional Location Verification and Routing (DLVR) in Vehicular Ad-hoc Network. DLVR model prevents the false location information of the nodes by reduced packet drop and increased packet delivery ratio. Before transmitting data packets DLVR verifies data packets through reliability check. Through simulation work, it has shown the proposed DLVR model reduced packet drop and increased packet delivery ratio which increases the network performance.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 3038 ◽  
Author(s):  
Nadeem Javaid ◽  
Abdul Majid ◽  
Arshad Sher ◽  
Wazir Khan ◽  
Mohammed Aalsalem

Sparse node deployment and dynamic network topology in underwater wireless sensor networks (UWSNs) result in void hole problem. In this paper, we present two interference-aware routing protocols for UWSNs (Intar: interference-aware routing; and Re-Intar: reliable and interference-aware routing). In proposed protocols, we use sender based approach to avoid the void hole. The beauty of the proposed schemes is that they not only avoid void hole but also reduce the probability of collision. The proposed Re-Intar also uses one-hop backward transmission at the source node to further improve the packet delivery ratio of the network. Simulation results verify the effectiveness of the proposed schemes in terms of end-to-end delay, packet delivery ratio and energy consumption.


2018 ◽  
Vol 14 (4) ◽  
pp. 155014771877253 ◽  
Author(s):  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
TaeYong Kim ◽  
Hoon Jae Lee

Developing a secure and smart intelligent transport system for both safety and non-safety application services requires a certain guarantee of network performance, especially in terms of throughput and packet collision performance. The vehicular ad hoc network propagation is strongly affected due to varying nature of the environment. The existing radio propagation path loss models are designed by using mean additional attenuation sophisticated fading models. However, these models do not consider the obstacle caused due to the obstacle of the vehicle in line of sight of the transmitting and receiving vehicle. Thus, the attenuation signal at the receiving vehicles/devices is affected. To address this issue, we present an obstacle-based radio propagation model that considers the effect caused due to the presence of obstructing vehicle in line of sight. This model is evaluated under different environmental conditions (i.e. city, highway, and rural) by varying the speed of vehicles and vehicles’ density. The performance of the model is evaluated in terms of throughput, collision, transmission efficiency, and packet delivery ratio. The overall result shows that the proposed obstacle-based throughput model is efficient considering varied speed and density. For instance, in the city environment, the model achieves an average improvement of 9.98% and 25.02% for throughput performance over other environments by varying the speed and density of devices respectively and an improvement of 15.04% for packet delivery ratio performance over other environments considering varied speed of devices.


2012 ◽  
Vol 241-244 ◽  
pp. 2284-2289 ◽  
Author(s):  
Juan Li ◽  
Xiao Lin Zhang ◽  
Jun Hai Bao ◽  
Guo Lei Geng

Based on the traditional DSR Protocols have obvious drawbacks such as low packet delivery rate and high routing overhead in the signal intensive UAV network. This paper introduces an improved DSR protocol(Restrict-DSR). The new DSR protocol can save the space of node routing memory and reduce the routing overhead by limiting the maximum hop count of route request. Simulation results by NS2 show that the RE-DSR has improved the packet delivery ratio and decreased the average of packet end-to-end delay and routing overhead comparing with the conventional DSR Protocols in the signal intensive UAV network.


2021 ◽  
Vol 5 (5) ◽  
pp. 94-101
Author(s):  
Ansar Jamil ◽  
Mohammed Qassim Ali ◽  
Muhammed E. Abd Alkhalec

The security issue is one of the main problems in Wireless Sensor Network (WSN) and Internet of Things (IoTs). RPL (Routing protocol for low power and lossy networks) is a standard routing protocol for WSN, is not to be missed from being attacks. The performance of RPL is reduced significantly after being attacked. Sinkhole attack is one of the most common attacks to WSN and RPL, threatening the network capability by discarding packets and disrupting routing paths. Therefore, this paper proposes a new Secured-RPL routing protocol to detect and avoid sinkhole attacks in the network, which is called Cross Layers Secured RPL (CLS-RPL). This routing protocol is enhanced of the existing RPL routing protocol. CLS-RPL is a cross-layer routing protocol that uses information from the data link layer in its security mechanism. CLS-RPL uses a new technique and concept in detecting a sinkhole attack that is based on eave-listening (overhearing) that allows a child node to eave-listening its parent transmission. If the child node does not hear any transmission from its parent node after sending several packets, this means its parent node is a sinkhole attacker. Otherwise, if the node hears transmission from its parent node, this means that its parent node is legitimate and continues to send more packets. CLS-RPL implements a simple security mechanism that provides a high packet delivery ratio. The finding shows that CLS-RPL provides 52% improvement in terms of packet delivery ratio when compared to RPL protocol.


Author(s):  
Ana Oktaviana ◽  
Doan Perdana ◽  
Ridha Muldina Negara

IEEE 802.11ah is a new task group on the IEEE 802.11 standard designed to work on the 900 MHz. It is with a range of communication coverage up to 1kilometer, lower energy consumption, and up to 8191 stations. There are two types of STAs in 802.11ah: sensor type to support sensor service and non-sensor type for offload service. In this research, it only focuses on non-sensor STA. For non-sensor STA, maximizing throughput is more important than power consumption. This research aims to see the performance of IEEE 802.1 1ah with Enhanced Distributed Channel Access (EDCA). To achieve that purpose, a mechanism is needed to provide guarantees various services required by theSTA. EDCA is an access mechanism used to set the Quality of Service (QoS) for the IEEE 802.11 standard through modifications in MAC layer. In this research,it focuses on one of the EDCA parameters, Arbitration Inter-Frame Space (AIFS). In addition, this research also focuses on the 802.11ah feature is Restricted Access Window (RAW) by changing the number of the RAW groups. From the results of the research, it is found that the improvement scheme with Arbitration Inter-Frame Space Number (AIFSN) value AC BK = 2, AC BE = 1, AC VI = 1, AC VO = 1 has better performance compared to the default scheme with AIFSN value AC BK = 7, AC BE = 3, AC VI = 2, AC VO = 2) with an average throughput of 1.504598 Mbps, average overall delay of 0.066242 second and average PDR of 62%. In addition, changes in the number of RAW groups and RAW slots affect network performance. This feature can improve the value of throughput, average delay, and Packet Delivery Ratio. The goals of this research is to know the effect of AIFSN value changes on AIFSN parameters, variation of RAW group and RAW slot number to throughput,average delay and packet delivery ratio.


Author(s):  
Sonal Telang Chandel ◽  
Sanjay Sharma

Background & Objective: Currently, WSN (Wireless Sensor Networks) provides a variety of services in industrial and commercial applications. WSN consists of nodes that are used to sense the environments like humidity, temperature, pressure, sound, etc. As the use of WSN grows there are some issues like coverage, fault tolerance, a deployment problem, localization, Quality of Service, etc. which needs to be resolved. Sink deployment is a very important problem because it is not the only impact on performance, but also influence on deployment cost. In traditional WSN, a single sink is deployed in the network, which aggregates all the data. Due to this, the whole network is suffering from some serious issues like delay, congestion, network failure that reduces network performance. Methods: One solution is to deploy multiple sinks instead of a single sink. Deploying multiple sinks can improve network performance, but increases sink deployment cost. In this paper, an ISDOA (Improved Sink Deployment Optimization Algorithm) is proposed to find the optimum number of sinks and their optimum location in ROI. Simulation is carried out in Matlab simulator. The impact of sensors and sinks on various network performance parameters like throughput, network lifetime, packet delivery ratio, energy consumption and cost of the network is analyzed. Results & Conclusion: It is shown by simulation results that the number of sinks varies inversely with energy consumption of the nodes; and it is linearly proportional to the network lifetime, throughput and packet delivery ratio. Furthermore, results show that the proposed approach outperforms random deployment with 25% higher throughput, 30% better network lifetime, 15% lesser energy consumption and 21% optimized cost of the network, respectively.


2020 ◽  
Vol 13 (2) ◽  
pp. 147-157 ◽  
Author(s):  
Neha Sharma ◽  
Sherin Zafar ◽  
Usha Batra

Background: Zone Routing Protocol is evolving as an efficient hybrid routing protocol with an extremely high potentiality owing to the integration of two radically different schemes, proactive and reactive in such a way that a balance between control overhead and latency is achieved. Its performance is impacted by various network conditions such as zone radius, network size, mobility, etc. Objective: The research work described in this paper focuses on improving the performance of zone routing protocol by reducing the amount of reactive traffic which is primarily responsible for degraded network performance in case of large networks. The usage of route aggregation approach helps in reducing the routing overhead and also help achieve performance optimization. Methods: The performance of proposed protocol is assessed under varying node size and mobility. Further applied is the firefly algorithm which aims to achieve global optimization that is quite difficult to achieve due to non-linearity of functions and multimodality of algorithms. For performance evaluation a set of benchmark functions are being adopted like, packet delivery ratio and end-to-end delay to validate the proposed approach. Results: Simulation results depict better performance of leading edge firefly algorithm when compared to zone routing protocol and route aggregation based zone routing protocol. The proposed leading edge FRA-ZRP approach shows major improvement between ZRP and FRA-ZRP in Packet Delivery Ratio. FRA-ZRP outperforms traditional ZRP and RA-ZRP even in terms of End to End Delay by reducing the delay and gaining a substantial QOS improvement. Conclusion: The achievement of proposed approach can be credited to the formation on zone head and attainment of route from the head hence reduced queuing of data packets due to control packets, by adopting FRA-ZRP approach. The routing optimized zone routing protocol using Route aggregation approach and FRA augments the QoS, which is the most crucial parameter for routing performance enhancement of MANET.


Author(s):  
Rajnesh Singh ◽  
Neeta Singh ◽  
Aarti Gautam Dinker

TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. TCP works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only one or two measures. These one or two measures do not seem to be sufficient for proper analysis of improvised version of TCP. So, in this paper, the performance of different TCP versions is investigated with DSDV and AODV routing Protocols. We analyzed various performance measures such as throughput, delay, packet drop, packet delivery ratio and number of acknowledgements. The simulation results are carried out by varying number of nodes in network simulator tool NS2. It is observed that TCP Newreno achieved higher throughput and packet delivery ratio with both AODV and DSDV routing protocols.Whereas TCP Vegas achieved minimum delay and packet loss with both DSDV and AODV protocol. However TCP sack achieved minimum acknowledgment with both AODV and DSDV routing protocols. In this paper the comparison of all these TCP variants shows that TCP Newreno provides better performance with both AODV and DSDV protocols.


Sign in / Sign up

Export Citation Format

Share Document