Open Access
Subscription Access
The Evaluation and Detection of Sinkhole Attack by Implementing Genetic Algorithm in MANET
Subscribe/Renew Journal
In a mobile ad-hoc network (MANET), there is a temporary network setup by wireless nodes which randomly move and communicate in the absence of proper infrastructure of network. MANETS are prone to various kinds of attacks due to its various features of dynamic changing topology, limited battery life and distributed nature. One of the attacks which affect the network is sinkhole attack. This paper mainly includes the optimization of data packets and data route for sinkhole attack using weight function over the network based on genetic algorithm and compare the results with and without optimization of sinkhole attack in the network.
Keywords
MANET, Sinkhole Attack, AODV Routing Protocol, Genetic Algorithm, Energy Consumption, Packet Delivery Ratio, Throughput..
User
Subscription
Login to verify subscription
Font Size
Information
- Caimu Tang, and Dapengoilver, “An Efficient Mobile Authentication Scheme for Wireless Networks, ” IEEE, 2011.
- W. Stallings, “Data Communication”, In: Data and Computer Communication, 7th Ed., Prentice Hall, ch. 1, 2003, pp. 10-14.
- B. Forouzan,“ICMP”, In: Data Communication and Networking, Fourth Ed., McGraw-Hill, ch.21, 2006, pp. 621-637.
- Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt, and Piet Demeester, “An overview of Mobile Ad hoc Networks: Applications and challenges,” Sint Pietersnieuwstraat 41, Belgium, 2005.
- R. E. Kassi, A. Chehab, and Z. Dway, “DAWWSEN: A Defense Mechanism against Wormhole Attacks in Wireless Sensor Networks, ” in proceeding of the second International conference on innovations in information Technology (ITT’ 05), UAE, September.
- Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, IEEE INFOCOM, Mar 2003.
- S. Capkun, L. Butty´an, and J. P. Hubaux, “SECTOR: secure tracking of node encounters in multi-hop wireless networks”, In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Oct, 2003, pp. 21–32.
- Shalini Jain, Dr.Satbir Jain, “ Detection and prevention of wormhole attack in mobile Ad hoc networks,” in International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 1793-8201, 2010, pp.78-86.
- J. Zhen and S. Srinivas, “Preventing replay attacks for secure routing in ad hoc networks”, In Ad hoc-NoW, LNCS 2865, 2003, pp. 140–150.
- Perkins C. and Bhagwat P, “Highly dynamic destination-sequence distance-vector routing (DSDV) for mobile computers,In: Proceedings of ACM Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM)
- Perkins C. and Royer E, “Ad hoc on-demand distance vector routing”, In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, 1999, pp. 90-100.
- Perkins.C.E, “Ad hoc Networking, ” Boston, Addison Wesley (2001).
- Harris Simaremare and Riri Fitri Sari, “Performance Evaluation of AODV variants on DDoS, Blackhole and Malicious Attacks”, International Journal of Computer Science and Network Security, VoL-11, pp.6, June 2011.
- Tamilselvan L. and Sankaranarayanan D. V, “Prevention of impersonation attack in wireless mobile ad hoc Networks,” International Journal of Computer Science and Network Security (IJCSNS), Vol. 7, No. 3, 2007, pp.118–123.
- Mariappan Kadarkarainadar Marichelvam, Thirumoorthy Prabaharan, and Xin She Yang, “A Discrete Firefly Algorithm for the Multi-Objective Hybrid Flowshop Scheduling Problems”, IEEE transactions on evolutionary computation, vol. 18, 2014.
- Manoj Jhuria, “Improve Perfomance DSR Protocol by Application of Mobile Agent”, 2014 Fourth International Conference on Communication Systems and Network Technologies, IEEE, 2014, pp.336-341.
- Mohammed Dyabi, “A new MANETs clustering algorithm based on nodes performances”, Next Generation Networks and Services (NGNS) , IEEE, 2014, pp. 22-29.
- Istikmal, “ Analysis And Evaluation Optimization Dynamic Source Routing (DSR) Protocol in Mobile Ad hoc Network Based on Ant Algorithm”, Information and Communication Technology (ICOICT), IEEE, 2013, pp. 400-404.
- K. Amjad, “Performance analysis of DSR protocol under the influence of RPGM model in mobile ad-hoc networks,” 2011 31st International Conference on Distributed Computing Systems Workshops, IEEE, 2013.
- K. Naidua, H. Mokhli, A. H. A. Bakar, “Application of Firefly Algorithm (FA) based optimization in load frequency control for interconnected reheat thermal power system, ” 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), IEEE, 2013.
- Mohammad Wazid, Avita Katal, “Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network, ” International conference on Communication and Signal Processing, IEEE, 2013, pp. 576- 581.
- Meenakshi Tripathi,M.S.Gaur,V.Laxmi, “Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN, ” The 8th International Symposium on Intelligent Systems Techniq, Procedia Computer Science, 2013, pp. 1101 – 1107.
- M. Mohanapriya , Ilango Krishnamurthi, “Modified DSR protocol for detection and removal of selective black hole attack in MANET, ” Computers and Electrical Engineering, 2013.
- Ting Lu and Jie Zhu, “Genetic Algorithm for Energy-Efficient QoS Multicast Routing, ” IEEE Communications Letters, Vo.17, 2013, pp. 31-35.
- Ashok M. Kanthe, Dina Simunic and Ramjee Prasad, “Comparison of AODV and DSR On-Demand Routing Protocols in Mobile Ad hoc Networks,” Emerging Technology Trends in Electronics, Communication and Networking (ET2ECN), IEEE, 2012, pp.1-5.
- K.S.Sujatha, Vydeki Dharmar, R.S.Bhuvaneswaran, “Design of Genetic Algorithm based IDS for MANET,” IEEE, pp. 28-35, 2012.
- M. H. Sulaiman, M. W. Mustafa, Z. N. Zakaria, O. Aliman, S. R. Abdul Rahim, “Firefly Algorithm Technique for Solving Economic Dispatch Problem,” Power Engineering and Optimization Conference (PEDCO) Melaka, IEEE, 2012.
- Lila Kari, GrzegorzRozenberg, “The Many Facets of Natural Computing,” Communication of the ACM,vol. 51, no.10, 2008.
- X.S. Yang, S. Deb, “Cuckoo Search via Lévy Flights,” Proceedings of World Congress on Nature & Biologically Inspired Computing (NaBIC 2009, India), IEEE Publications, 2009, pp. 210-214.
- Rohit Gupta, Ravindra Singh, Sajal Kumar, “Multi-channel MAC protocol using multi-tone synchronous collision resolution in a mobile ad hoc network,” US7466676, May 31, 2006.
- Subramanian Ramanathan , Prithwish Basu, Richard Earl Hansen, Christine Elaine Jones, Rajesh Krishnan, Regina Rosales Hain, “Systems and methods for adaptive routing inmobile ad-hoc networks and disruption tolerant networks ,” US 8149716 B2, Apr 3, 2012.
- Dinesh Verma , “Method and apparatus for detection of malicious behavior in mobile ad-hoc networks ,”US 8122505 B2, Feb 21, 2012. [33] Thomas Jay Billhartz ,”Mobile ad-hoc network with intrusion detection features and related methods ,” US 7082117 B2, Jul 25, 2006.
Abstract Views: 277
PDF Views: 113