Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Suhasini, A.
- Efficient Multipath Zone-Based Routing in MANET Using (TID-ZMGR) Ticked-ID Based Zone Manager
Abstract Views :290 |
PDF Views:2
Authors
Affiliations
1 Department Computer Science and Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
2 Department Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
3 Department of Electronics and Communications Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
1 Department Computer Science and Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
2 Department Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
3 Department of Electronics and Communications Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 435-443Abstract
Mobile ad hoc networks (MANETs) is an infrastructure-less network, which is self-organizing, self-configuring and dynamic. The traditional routing protocol is not efficient against the routing challenges. The traditional MANET routing mechanisms involve overhearing, retransmission, and idle listening, which consume high energy. The main obstacles for MANET are end-to-end delay, energy consumption, and packet collision problems. The enhancement of network lifetime and communication performance is still a challenging task. This paper proposes a Ticket-ID zone manager routing protocol (TID-ZMGR) with sleep scheduling for MANETS. The proposed system consists of a zone routing system that is effective in load balancing and energy-efficient. In the proposed approach, nodes in the network are grouped as zones with a zone leader (ZL). The ZL is the node with higher efficiency in terms of energy, link quality, connectivity, and distances. The TID-ZMGR follows a multipath mechanism for balancing the load, and traffic is controlled by distributing the path from source to destination. The implementation of an adaptive sleep duty cycling approach ensures error-free communication around the network. Additionally, the adaptive sleep duty cycling approach increases the overall accuracy by saving the power on border nodes. The efficiency of the proposed work is proved by the comparison work carried out between Ticket-ID Based Routing management system (TID-BRM) Zone-based Routing with Parallel Collision Guided Broadcasting Protocol (ZCG) and Distance aware Zone Routing Protocol (DZRP) with TID-ZMGR. Experimental work evaluation metrics are zonal leader changes, energy consumptions, and network lifetime. Simulation result shows proposed mechanism achieves minimum energy consumption with improved output on throughput and packet delivery ratio.Keywords
MANET, ZL, ZCG, DZRP, TID-ZMGR.References
- Ravilla D, Putta CSR (2012) Energy Management in zone routing protocol (ZRP). In: Wyld D, Zizka J, Nagamalai D (eds) Advances in computer science, engineering & applications. Advances in intelligent systems and computing, vol 167. Springer, Berlin, Heidelberg, pp 355–366
- Sateesh Kumar P, Ramachandram S (2009) Load balancing in genetic zone routing protocol for MANETs. World Acad Sci Eng Technol 35:517–522
- Nair AL, Perumal Sankar S (2016) Sleep scheduling technique for geographic routing in MANET. Int J Adv Res Electric Electron Instrum Eng 5(2):674–680
- Beijar N (2008) Zone routing protocol (ZRP). Networking Laboratory, Helsinki University of Technology, Espoo
- Aastha Mishra,Shweta Singh,Arun Kumar Tripathi, (2019). Comparison of MANET routing protocols, A Monthly Journal of Computer Science and Information Technology (IJCSMC), Vol. 8, Issue. 2, ISSN 2320–088X, pg. 67–74
- K.Spurthi, T.N.shankar, An Efficient Cluster Computing Mechanism for Wormhole Attack Detection in MANET, International Journal of Advanced Science and Technology 29(7)(2020)
- Hossain, S., Hussain, M. S., Ema, R. R., Dutta, S., Sarkar, S., & Islam, T. (2019). Detecting Blackhole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET. (2019),10th International Conference on Computing, Communication, and Networking Technologies (ICCCNT)
- K.Spurthi, T.N.Shankar, A Research on Wormhole Attack in Mobile Adhoc Networks, International Journal Of Recent Technology and Engineering, 8(14) (2019) 1125-1130.
- Khan, M. F., Aadil, F., Maqsood, M., Bukhari, S. H. R., Hussain, M., & Nam, Y. (2019). Moth fame clustering algorithm for internet of vehicle (MFCA-IoV)
- W.-H. Liao, J.-P. Sheu, and Y.-C. Tseng, “GRID: a fully location-aware routing protocol for mobile ad hoc networks,” Telecommunication Systems, vol. 18, no. 1–3, pp. 37–60, 2001.
- Ray NK, Turuk AK (2016) A hybrid energy-efficient protocol for mobile ad hoc networks. J Comput Netw Commun 2016:1–11
- Shadi Basurra, Marina De Vos and Julian A. Padget , "Energy Efficient Zone-based Routing Protocol for MANETs", https://www.researchgate.net/, 2014, DOI:10.1016/j.adhoc.2014.09.010
- Sudarsan D (2014) Modified distance aware zone routing protocol for less delay transmission in MANET. Int J Res Eng Adv Technol 2(5):1–6
- Bhattacharya I, Bhattacharyya D, Barman S (2013) ZMEED: a zone based enhanced hybrid routing protocol for delay tolerant network. Int J Comput Appl 2013(2):7–11
- Shakya M, Markam K (2016) Comparison of AODV and DSR routing protocols by using group mobility model with varying pause time in vehicular ad-hoc network. International Journal of Hybrid Information Technology Vol.9, No.2 (2016), pp. 177-182 http://dx.doi.org/10.14257/ijhit.2016.9.2.15
- Ullah F, Ullah Z, Ahmad S, Islam IUI, Rehman SU, Iqbal J (2019) Traffic priority-based delay-aware and energy-efficient path allocation routing protocol for wireless body area network. J Ambient Intell Humaniz Comput 10:3775–3794
- M. B. Talawar and D. Ashoka, “Link failure detection in MANET: A survey,” in Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough Studies in Computational Intelligence, vol. 885. Cham: Springer, pp. 169–182, 2020.
- S. Mirjalili, “Genetic algorithm,” in Evolutionary Algorithms and Neural Networks. Studies in Computational Intelligence, vol. 780. Cham: Springer, pp. 43–55, 2019.
- D. Kukreja, D. K. Sharma, S. K. Dhurandher and B. R. Reddy, "GASER: Genetic algorithm-based secure and energy-aware routing protocol for sparse mobile ad hoc networks," International Journal of Advanced Intelligence Paradigms, vol. 13, no. 1–2, pp. 230–259, 2019.
- D. G. Zhang, S. Liu, X. H. Liu, T. Zhang and Y. Y. Cui, “Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO),” International Journal of Communication Systems, vol. 31, no. 18, pp. e3824, 2018.
- Venkatasubramanian, S., Suhasini, A. & Vennila, C. An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08731-6.
- Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET
Abstract Views :146 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, Faculty of Engineering and Technology, Annamalai University, Chidambaram, Tamil Nadu, India., IN
2 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India, IN
3 Electronics and Communication Department, Saranathan College of Engineering, Trichy, Tamil Nadu,, IN
1 Department of Computer Science and Engineering, Faculty of Engineering and Technology, Annamalai University, Chidambaram, Tamil Nadu, India., IN
2 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India, IN
3 Electronics and Communication Department, Saranathan College of Engineering, Trichy, Tamil Nadu,, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 6 (2022), Pagination: 724-735Abstract
.The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a "black hole" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.Keywords
Black Hole Attack, Convolutional Neural Network, Mobile Ad-Hoc Networks, Long Short-Term Memory, Hybrid Cat-Particle Swarm Optimization, Grey Hole Attacks.References
- Moudni, H., Er-rouidi, M., Mouncif, H. and El Hadadi, B., 2019. Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, pp.1176-1181.
- Gurung, S. and Chauhan, S., 2020. A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Networks, 26(3), pp.1981-2011.
- Eswaran, S., Rani, V., D., D., Ramakrishnan, J., & Selvakumar, S. (2021). An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure. International Journal of Pervasive Computing and Communications, 18(1), 59–78. https://doi.org/10.1108/ijpcc-04-2021- 0102.
- Manoranjini, J., Chandrasekar, A. and Jothi, S., 2019. Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika: časopiszaautomatiku, mjerenje, elektroniku, računarstvoikomunikacije, 60(3), pp.274-284.
- Yasin, A. and Abu Zant, M., 2018. Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wireless Communications and Mobile Computing, 2018.
- Sadhana, S., Sivaraman, E., & Daniel, D. (2021). Enhanced EnergyEfficient Routing for Wireless Sensor Network Using Extended PowerEfficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol. Smart Systems: Innovations in Computing, 159–171. https://doi.org/10.1007/978-981-16-2877-1_16.
- Gurung, S. and Chauhan, S., 2018. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24(8), pp.2957-2971.
- Thanuja, R. and Umamakeswari, A., 2019. Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Cluster computing, 22(2), pp.3131-3143.
- Rajendran, N., Jawahar, P.K. and Priyadarshini, R., 2019. Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, pp.129-135.
- Daniel D., Preethi N., Jakka, A., & Eswaran, S. (2021). Collaborative Intrusion Detection System in Cognitive Smart City Network (CSCNet). International Journal of Knowledge and Systems Science, 12(1), pp.60–73, https://doi.org/10.4018/ijkss.2021010105.
- Panda, N. and Pattanayak, B.K., 2018. Energy aware detection and prevention of black hole attack in MANET. International Journal of Engineering and Technology (UAE), 7(2.6), pp.135-140.
- Abood, M.S., Mahdi, H.F., Hamdi, M.M., Ibrahim, O.J., Mohammed, R.Q. and Ahmed, S.F., 2020, December. Black/Gray Holes Detection Tools in MANET: comparison and analysis. In 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS) (pp. 1-8). IEEE.
- E. Sivaraman, "Dynamic cluster broadcasting for Mobile Ad Hoc Networks," 2010 International Conference on Communication and Computational Intelligence (INCOCCI), 2010, pp. 123-127.
- Arul Selvan, M. and Selvakumar, S., 2019. Malicious node identification using quantitative intrusion detection techniques in MANET. Cluster computing, 22(3), pp.7069-7077.
- Bhuvaneswari, R. and Ramachandran, R., 2019. Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing, 22(5), pp.12689-12699.
- Prasanna, D.J.D., Aravindhar, D.J. and Sivasankar, P., 2021. Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud-MANET. Webology, 18(SI01), pp.88-106.
- Hassan, Z., Mehmood, A., Maple, C., Khan, M.A. and Aldegheishem, A., 2020. Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, pp.199618-199628.
- Rani, P., Verma, S., Rawat, D.B. and Dash, S., 2022. Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing and Applications, pp.1-11.
- Sathyaraj, P. and Kannan, K., 2021. Host based Detection and Prevention of Black Hole attacks by AODV-ICCSO Algorithm for security in MANETs.
- Janakiraman, S., Deva Priya, M., Aishwaryalakshmi, G., Suganya, T., Sam Peter, S., Karthick, S. and Christy Jeba Malar, A., 2022. Improved Rider Optimization Algorithm-Based Link Aware Fault Detection (IROA-LAFD) Scheme for Securing Mobile Ad Hoc Networks (MANETs). In 3rd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (pp. 155-169). Springer, Cham.
- Rani, P., Verma, S. and Nguyen, G.N., 2020. Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, pp.121755-121764.
- Ramachandran, D., Rajeev Ratna, V., PT, V.R. and Garip, I., 2022. A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD). Security and Communication Networks, 2022.
- Srinivasan, V., 2021. Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET. Ingénierie des Systèmesd'Information, 26(6).
- Liu, J., Jiang, X., Nishiyama, H. and Kato, N. (2013a) ‘On the delivery probability of two-hop relay MANETs with erasure coding’, IEEE Transactions on Communications, Vol. 61, No. 4, pp.1314–1326.
- Huang, H. and Zhou, Q. (2012) ‘Petri-net-based modeling and resolving of black hole attack in WMN’, The IEEE 36th Annual Computer Software and Applications Conference Workshops,Izmir, Turkey, pp.409–414.
- Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” Internet Draft, November 2002.
- A. Shevtekar, K. Anantharam, and N. Ansari, “Low Rate TCP Denialof-Service Attack Detection at Edge Routers,” IEEE Commun. Lett., vol. 9, no. 4, Apr. 2005, pp. 363–65.
- Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACMSE 42, APRIL 2004, pp. 96- 97.