Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of On-Demand Routing Protocols in MANETs Using (SHSP-EA3ACK) Algorithms

K. Thamizhmaran

Abstract


Mobile Adhoc Networks (MANETs) require a reliable, efficient, scalable routing and most importantly, every single node in the MANETs works as both receiver and transmitter within their communication range. As they are highly secure, self-organizing, rapidly deployed, they use dynamic routing to access information and services anywhere regardless of their geographic location. MANETs are the significant technologies among various air communication technologies where all the nodes are mobile and can be connected dynamically using wireless link in a random manner. All nodes work router and maintain routes to other nodes in the network. Introduction of the Enhanced Adaptive 3 Acknowledgement (EA3ACK) is to prevent the attacker from forging acknowledgement packets. In this paper recent research, a new intrusion detection system, EA3ACK using EAACK (DSA) with Secure Hybrid Shortest Path (SHSP) Routing is specially designed for MANETs to reduce end-to-end delay. ACK method is implemented to avoid any type of attacking model on the network with secure hybrid shortest path routing algorithm besides avoiding delay and packet loss, it increases the node speed also. Network Simulator (NS2) is used to simulate the proposed method and implemented in the test system.


Keywords


MANET, Watchdog, EA3ACK, HSPR, Delay, Packet Loss.

Full Text:

PDF

References


AnandPatwardhan and Iorga, Secure routing and Intrusion Detec-tion in Ad-hoc networks, in Proc. 3rd Int. Conf. Pervasive Com-puter Communication, pp.191–199, (2005).

Balakrishnan, et al, TWOACK: preventing selfishness in mobile ad hoc networks, Proc. Int. Conf. on Wireless Communications and Networking, vol.4, no.10, pp. 2137-2142, (2005).

Jongoh Choi, et al, Malicious Nodes Detection in AODV- Based Mobile Ad Hoc Networks, GESTS Trans. Comp. Science and Engg, vol.18, no.1, pp.49-55, (2005).

Liu, et al, An acknowledgment-based approach for the detection of routing misbehaviour in MANETs, IEEE Trans. Mobile Comput., vol.6, no.5, pp.536–550, (2007).

AishwaryaSagar and MeenuChawla, Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET, IJCSI, vol.7, iss.4, no.1, pp.12-17, (2010).

K. Sahadevaiah, et.al, Impact of Security Attacks on a New Securi-ty Protocol for Mobile Ad Hoc Networks, in Proc. 3rd Int. Conf. Network Protocols and Algorithms, vol.3, no.4, pp.122-128, (2010).

Prabu, K. and Subramani, A. Performance comparison of routing protocol in MANET, Int. J. of Adv. Research in Com. Sci. and Soft Engg., Vol. 2, No. 9, pp.388–392, (2012).

Shakshuki, et al, EAACK — A Secure Intrusion: Detection System for MANETs, IEEE Trans on industrial electronics, vol. 60, no. 3, pp.1089-1098, (2013).

Prabu, K. and Subramani, A. Energy efficient routing in MANET through edge node selection using ESPR algorithm, Int. J. Mobile Network Design and Innovation, vol. 5, no. 3, pp.166–175, (2014).

AbdulsalamBasabaaa, et al, Implementation of A3ACKs intrusion detection system under various mobility speeds, in Proc. 5th Int. Conf. on Ambient Systems, Networks and Technologies, pp.571-578 (2014).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.