Title
ACO based AODVMethod for Detection and
Recovery of Misbehaving Node in MANET
Authors: M. Sumathi & Dr. M.Gunasekaran
“Sumathi, M., and M. Gunasekaran. "ACO based AODV Method for
Detection and Recovery of Misbehaving Nodes." Global Journal of
Computer Science and Technology (2018).”
Introduction
Wireless communication nowadayssurrounds us
in many colors and flavors, each with its specific
frequency band, coverage, and variety of
applications.
The authors mentioned 4 categories of MANET
1. Routing in Ad Hoc Networks
2. Attacks on Ad Hoc Networks
3. Security Model and Attributes
4. Security of Ad-Hoc Networks
5.
Introduction
1. Security Modeland Attributes
• Includes Confidentiality, Authentication,
Availability, Integrity, Non-Repudiation, fact of
discovery, Isolation, and location etc.
2. Security of Ad-Hoc Networks
Security vulnerabilities in ad-hoc networks are:
Limited computational capabilities:
Limited power supply:
Challenging key management:
6.
Review of Literature
•In literature review the authors mentioned 7 other
authors paper which are related to avoid the
selfishness or misbehavior of node in ad hoc network.
Like P.Nandhini Sri et.al (2016)
• In their work due to selfish node detection, data
packet transmission among the nodes the routing path
is mounted and maintained so long as it's far wished
and routing overhead is substantially decreased.
• For this purpose shortcut tree routing (STR) protocol
was proposed to improve the performance of selfish
node.
7.
Problem Statement
• Theauthor have focused on the problem of
detecting misbehaving links instead of
misbehaving nodes using 2ACK scheme.
• In the next-hop link, a misbehaving sender or a
misbehaving receiver has a similar adverse effect
on the data packet. It will not be forwarded
further. The result is that this link will be tagged.
8.
Proposed Work
• Theproposed system is used to detect the
misbehavior routing using 2ACK and
• Additionally take a look at the confidentiality of
the data message in MANETs.
• At the destination, a hash code can be
generated and in comparison with the sender’s
hash code to test the confidentiality of the
message.
9.
Proposed Work
Algorithm ofthe proposed work
• if (2ACK time < WT) & orig msg not altered
valid
• if (2ACK time < WT) & orig msg altered link
is working properly and confidentiality is lost.
• if (2ACK time > WT) & orig msg not altered
msg to sendr that the link is misbehaving.
• if (2ACK time > WT) & orig msg altered link
is misbehaving and loss of confidentiality.
10.
Nomenclature
• Cpkts =the number of the packets sent.
• Cmiss = the number of 2ACK packets missed.
• d = the acknowledgment ratio.
• WT = waiting time, i.e., the maximum time
allotted to receive 2ACK packet.
• 2ACK Time=Current Time (Acknowledgement
accepted time) – Start Time.
• The authors have used the triplet of N1 →N2 →N3
as an example to illustrate 2ACK’s pseudo code.
11.
Algorithm: Module 1
Thismodule is called sender module.
After sending every packet from source the “Cpkts”
counter is incremented by 1. and 2ACK time is
compared with the wait time.
If 2ACK time is less than the wait time, “Cmiss”
counter is incremented by 1.
The ratio of “Cmiss” to “Cpkts” is compared with the
“Rmiss” (a threshold ratio). If it is less than “Rmiss”,
the link is working properly otherwise misbehaving.
• 2ACK Time=Current Time (Acknowledgement
accepted time) – Start Time.
12.
Algorithm: Module 2
•This module is called Intermediate module.
• Get 2ACK packet from the receiver and send
2ACK packet to the sender.
Module 3: Destination node:
• The task of this module is to receive a message
from the intermediate node, take out
destination name, hash code and decode it.
Compare it and Send 2ACK to source through
the intermediate node.
13.
Algorithm:
Step 1: Startthe algorithm.
Step 2: Deploy the node 1000 x 1000
areas.
Step 3: If the node is failure in
deployment move to Step 4.
Step 4: Initialization of node failure
identification.
Step 5: Evaluate the parameter for
node identification.
Step 6: Perform ACO for node
detection and routing.
Step 7: If the node is affected node
then recover the node otherwise Step
8.
Step 8: Terminate the process.
Conclusion
• The authorshave investigated the performance
degradation of the network because of a
misbehaving nodes in MANET.
• The authors used the triplet of N1 →N2 →N3 as an
example to illustrate 2ACK’s.
• The AODV protocol with the Ant Optimization is
used to detect the misbehaving node.
• The retransmission of 2ACK has been performed in
ACO optimized routing path.
• So the ACO Based AODV protocol performing better
than AODV.
16.
Mohajerani, Abdolreza, andDavood Gharavian. "An ant colony optimization
based routing algorithm for extending network lifetime in wireless sensor
networks." Wireless Networks 22, no. 8 (2016): 2637-2647.
An ant colony optimization based
routing algorithm for extending
network lifetime in wireless sensor
networks
Abdolreza Mohajerani
Davood Gharavian
Faculty of Electrical Engineering, Shahid Beheshti
University, Tehran, Iran
Springer Science+Business Media New York 2016
Introduction
• A wirelesssensor network (WSN) typically
consists of tens to hundreds or thousands of
relatively small nodes, each equipped with a
sensing device.
• Now a days wireless sensors are getting smaller,
cheaper, and more powerful.
• Due to the fast development of the
microprocessor, sensor and transceiver, there is
great applications foreground about WSNs.
19.
Introduction
• limited energyis the key issue in the influence
of WSNs performance.
• Most of the routing algorithms for sensor
networks require location information for
sensor nodes.
• ACO algorithm has been successfully applied
to solve some routing problems in WSN to
minimizing energy cost.
20.
literature review
• Inliterature review the authors mentioned
more than 20 other authors paper which were
related to ACO algorithm for finding route.
• The techniques were used for minimizing the
energy cost and extend the network life time
in WSN.
21.
Problem statement
• Theauthors used two energy parameters in its
competency function.
• The first competency function captures the
remaining energy levels of neighborhood nodes
in next-hop selection process, while
• While the second one focuses on the consumed
amount of energy in each neighborhood node.
22.
Basic ACO basedrouting for WSNs (ACA)
• (WSN) can be represented by a weighted
undirected connectivity-graph G (V, E).Where V
is the set of sensor nodes and
• E is the set of links between these nodes.
• The authors used the Euclidean distance for
calculate the distance between two node in
WSN area.
23.
An ant colonyoptimization based routing
algorithm for extends network lifetime in
wireless sensor networks (LTAWSN)
24.
The proposed systemensure that total energy
dissipation is divided equally
among all the nodes of the network.
The probability function for choice of the next-
hop node in current travel is made to
probabilistic decision rule:
LTAWSN
25.
This equation causethat the node with energy
level in candidate list, has higher probability to
selection.
26.
The distance betweennode consumption of energy in
candidate list, has higher probability to selection.
These two parameters ensure that total energy
dissipation is divided equally among all the nodes of the
network.
27.
where djd isthe distance between node j (that is in
candidate list of node i) and destination node d.
The location function proposed in LTAWSN,
is defined by:
28.
After definition ofdesign issue of proposed algorithm,
LTAWSN algorithm is defined as follow:
1. Start
2. Initialize the network size m X n and number of sensor nodes,
number of ants and number of iterations; distribute nodes uniformly
in this area
3. Initialize the default pheromone level of links between network
nodes and also the energy level of each node;
4. A set of ants placed in source node
5. for ( i=1 to iteration number )
6. begin
7. for ( j=1 to ant number )
8. begin
9. Cnode (Current node) = source node
10. while Cnode!= destination node
11. Begin
29.
After definition ofdesign issue of proposed algorithm,
LTAWSN algorithm is defined as follow:
12. Calculate energies and location metrics between current
node and its neighbors in its candidate list.
13. Consider pheromone level between current node and its
neighbors in its candidate list
14. Calculate probability function for nodes in candidate list
15. Choose the next-hop node
16. Cnode= next-hop node
17. End while
18. End for
19. Modify the path density of pheromone.
20. End for
21. End
30.
Conclusion
The authors proposeda new ACO based routing
algorithm that use spatial parameters in its
competency function.
The new pheromone update operator was
designed to integrate energy consumption and
hops into routing choice.
In the proposed scheme it was ensure that total
energy dissipation is divided equally among all
the nodes in the network.