Open Access Open Access  Restricted Access Subscription Access

INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET


Affiliations
1 Periyar University, India
2 Arignar Anna Government Arts College, India
 

   Subscribe/Renew Journal


The dynamic nature of mobile ad-hoc network (MANET) provides consistent communication endurance. MANET is renowned for its selfconfigurable formation of interrelated network nodes. This decentralized property of MANET is vulnerable for various types of attacks which could impact the performance of the network and the protection of sensitive data transmitted through the network. The active node adaptation policy of MANET stipulates the possibility of multiple intruder instillations. Any intruder node can generate multiple attacks based on the potential and the rationale of the intrusion. The objective of this investigative work is to analyze the potential multiple threats and their possible consequences while using some prevailing security architectures along with relevant protocols. A common testbed is established with state-of-the-art network evaluation software OPNET in which random network environment with identical characteristics are used to evaluate the existing methods in terms of throughput, communication delays and security.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Tanweer Alam, “Device-to-Device Communications in Cloud, MANET and Internet of Things Integrated Architecture”, Journal of Information Systems Engineering and Business Intelligence, Vol. 6, No. 1, pp. 18-26, 2020.
  • K.M. Balamurugan and S.V. Bhanu, “A Multi-Objective Krill Herd Algorithm for Virtual Machine Placement in Cloud Computing”, Journal of Supercomputing, Vol. 76, No. 6, pp. 4525-4542, 2020.
  • M. Krzyszton and E. Niewiadomska Szynkiewicz, “Adaptation of MANET Topology to Monitor Dynamic Phenomena Clouds”, Proceedings of International Conference on Computer Science and Information Systems, pp. 865-872, 2017.
  • M. Pahlevan and R. Obermaisser, “Evaluation of TimeTriggered Traffic in Time-Sensitive Networks using the OPNET Simulation Framework”, Proceedings of International Conference on Parallel, Distributed and Network-based Processing, pp. 283-287, 2018.
  • S. Lee, J. Ali and B. Roh, “Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET”, Proceedings of International Conference on Computing, Networking and Communications, pp. 197-202, 2019.
  • Tanweer Alam, “Internet of Things: A Secure Cloud-Based MANET Mobility Model”, International Journal of Network Security, Vol. 22, No. 3, pp. 1-17, 2020.
  • N. Islam, “A Secure Service Discovery Scheme for Mobile Ad Hoc Network using Artificial Deep Neural Network”, Proceedings of International Conference on Frontiers of Information Technology, pp. 133-1335, 2019.
  • Pijush Kanti Bhattacharjee, “Mutual Authentication Technique with Four Biometric Entities Applying Fuzzy Neural Network in 5G Mobile Communications”, IOSR Journal of Electronics and Communication Engineering, Vol. 15, No. 3, pp. 38-46, 2020.
  • Kai Ye, “Key Feature Recognition Algorithm of Network Intrusion Signal Based on Neural Network and Support Vector Machine”, Symmetry, Vol. 11, No. 3, pp. 380-395, 2019.
  • Xiaopeng Tan, Zhen Zuo, Shaojing Su, Xiaojun Guo and Xiaoyong Sun, “Research of Security Routing Protocol for UAV Communication Network Based on AODV”, Electronics, Vol. 9, No. 8, pp. 1185-1195, 2020.
  • Valmik Tilwari, Kaharudin Dimyati, M.H.D. Nour Hindia, Anas Fattouh and Iraj Sadegh Amiri, “Mobility, Residual Energy, and Link Quality Aware Multipath Routing in MANETs with Q-learning Algorithm”, Applied Sciences, Vol. 9, No. 8, pp. 1582-1598, 2019.
  • Muhammad Zeeshan Asghar, Mudassar Abbas, Khaula Zeeshan, Pyry Kotilainen and Timo Hamalainen, “Assessment of Deep Learning Methodology for SelfOrganizing 5G Networks”, Applied Sciences, Vol. 9, No. 15, pp. 2975-2989, 2019.
  • Tanweer Alam, “Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework”, Journal of Telecommunication, Electronic and Computer Engineering, Vol 12, No. 1, pp. 1-13, 2020.
  • Ahmed A. Abd EL-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca and Wojciech Mazurczyk, “Efficient Quantum-based Security Protocols for Information Sharing and Data Protection in 5G Networks”, Future Generation Computer Systems, Vol. 100, No. 1, pp. 893-906, 2019.
  • M. De Ree, G. Mantas, J. Rodriguez and I.E. Otung, “Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells”, Proceedings of International Conference on 5G World Forum, pp. 80-85, 2019.
  • Zheng Lu and Hongji Yang, “Unlocking the Power of OPNET Modeler”, Cambridge University Press, 2019.
  • Maryam Pahlevan and Roman Obermaisser, “Evaluation of Time-Triggered Traffic in Time-Sensitive Networks using the OPNET Simulation Framework”, Proceedings of International Conference on Parallel, Distributed and Network-based Processing, pp. 283-287, 2018.
  • David Basin, Cas Cremers and Catherine Meadows, “Model Checking Security Protocols”, Springer, 2018.
  • Sun-Ju Kim, Ji-Hyun Min and Han-Na Kim, “The Development of an IoT-Based Educational Simulator for Dental Radiography”, Proceedings of International Conference on Healthcare Information Technology for the Extreme and Remote Environments, pp. 12476-12483, 2019.

Abstract Views: 408

PDF Views: 170




  • INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET

Abstract Views: 408  |  PDF Views: 170

Authors

G Jeeva
Periyar University, India
K Selvaraj
Arignar Anna Government Arts College, India

Abstract


The dynamic nature of mobile ad-hoc network (MANET) provides consistent communication endurance. MANET is renowned for its selfconfigurable formation of interrelated network nodes. This decentralized property of MANET is vulnerable for various types of attacks which could impact the performance of the network and the protection of sensitive data transmitted through the network. The active node adaptation policy of MANET stipulates the possibility of multiple intruder instillations. Any intruder node can generate multiple attacks based on the potential and the rationale of the intrusion. The objective of this investigative work is to analyze the potential multiple threats and their possible consequences while using some prevailing security architectures along with relevant protocols. A common testbed is established with state-of-the-art network evaluation software OPNET in which random network environment with identical characteristics are used to evaluate the existing methods in terms of throughput, communication delays and security.

References