MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
More Related Content
Similar to SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN MANET
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure
itself, because of moving of nodes. As MANETs are mobile in nature, they use wireless connections to connect various
networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed
cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security
attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the
shortest path to the destination node in response to a route request message. Our mechanism helps to protect the
network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on
integrated MANET-Internet communication efficiently. Simulation will be carried out by using network simulator
tool so as to address the problem of detection & prevention of grey hole attack in mobile ad-hoc network. In this thesis
uses Particle swarm optimization(PSO).Which monitors by changing its values because of adhoc nature ,if node
converge then it change its value infinite and prevent the node to send packet.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...ijceronline
Mobile Ad hoc networks (MANETs) consist of a set of mobile nodes which can move about freely and are very sensitive to security threats due to their nature of deployment such as open wireless system. MANETs have self-configuring ability of nodes and infrastructure less nature hence they are preferred in significant applications. This itself emphasizes the importance of security and the need for an efficient intrusion detection system in MANETs. Many IDS have been proposed for detecting malicious nodes. On such different IDS, Enhanced Adaptive Acknowledgment (EAACK) has overcome the drawbacks of Watchdog, ACK and TWOACK. In our proposed work we have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness. High mobility of MANET nodes contributes to frequent link breakages in the network which leads to path failures and route discovery processes difficult. Route discovery is initialized through broadcast mechanism usually. In this paper a new intrusion detection system is proposed named Advance EAACK particularly designed for MANETs. Compared to modern approaches, advance EAACK demonstrates higher malicious behavior detection rates in certain conditions while does not affect the network performance greatly. Due to this mechanism data transformation between mobile nodes are done with improved or high security .Parameters going to measure network performance are packet delivery ratio and delay.
Similar to SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN MANET (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN MANET
1. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
DOI:10.5121/ijcnc.2023.15207 127
SECURE ROUTING PROTOCOL TO MITIGATE
ATTACKS BY USING BLOCKCHAIN
TECHNOLOGY IN MANET
Nitesh Ghodichor1
, Raj Thaneeghavl. V1
, Dinesh Sahu1
, Gautam Borkar2
,
Ankush Sawarkar3
1
Department of Computer Science and Engineering, SRK University, Hoshangabad
Road, Misrod, Bhopal-462026 (India),
2
Department of Information Technology, RAIT, DY Patil University Sector 7. Nerul,
Navi Mumbai 400706 (India),
3
Department of Computer Science and Engineering, VNIT, South Ambazari Road,
Nagpur, Maharashtra. 440010 (India),
ABSTRACT
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
KEYWORDS
Mobile Adhoc Network, Security, Attacks and Malicious Nodes, Secure Routing, security mechanism,
Blockchain
1. INTRODUCTION
MANET is a wireless network [1] without a central administration. MANET's simplicity makes it
popular. In a MANET, nodes communicate using radio frequency. MANET's open design is
vulnerable [1]. The attacker may target the network while data or packets are transferred or by
monitoring network activity. Attacks might target data or control. After network control
information is delivered, MANET sends data in packets. Attacks are any activity or threat that
compromises a network's security. Critical MANET security. Open media prohibits end-to-end
linkages. Security is maintained via many techniques. Key-based protocols and IDS authenticate
Plan. SRA and Blockchain are protected by Secure Routing Protocol. Blockchain ensures data
2. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
128
record security and validity without a third party. Blocks store data in a blockchain. When full,
blocks are sealed and added to the chain.
Blockchain allows decentralised trust and security. New blocks are added sequentially. They're
added to blockchain's "end." Once a block is added to the blockchain, changing its contents
requires a majority vote. Each block has a hash, the previous block's hash, and the date. Hash
codes convert digital data to numbers and letters. Data changes the hash code.
A cryptographic hash function is a mathematical operation [3]. Standard hash functions accept
variable-length inputs and produce fixed-length [2] outputs (hashes). Cryptographic hash
functions combine message-passing and security [3]. Traditional hash functions are secured by
cryptographic hash functions [3], which makes it more difficult to decipher message content or
recipient information. Given the network's vulnerability, assaults are classed as follows. SRA
with blockchain enables network security by producing hash codes for each transaction and
authenticating each node for data and control packets.
Early research focused only on secure data transmission routing mechanisms, even though attacks
might occur in any MANET security layer. Most MANET security approaches require network
nodes to perform a disproportionate amount of work based on constantly updated topology
control. This wastes resources and puts users at risk of hacker assaults. Without verification,
nodes distrust each other. Attacks that swiftly enter and change residential nodes can harm
network performance. This paper presents a blockchain-based, management-secure, QoS-
enhanced MANET.
By combining a hash function and blockchain technology to authenticate nodes that join the
network, SRA with blockchain maintains the network's security. Smart network nodes keep track
of the surrounding node's characteristics and if it makes a substantial contribution. The decision is
made using the delay criterion. The suggested algorithm offers precise data for decision-making
and maintain network security, the node is removed from the network based on its delay factor.
2. RELATED WORK
U. Srilakshmi et al in January 19, 2022, The "A Secure Optimization Routing Algorithm for
Mobile Ad Hoc Networks" proposed algorithm [4] uses optimization algorithms, which find new
ways to progress routing, to provide trust-based safe and energy-efficient navigation in MANETs.
Once the fuzzy clustering approach has been activated, the Cluster Heads (CHs) are selected
based on the indirect, direct, and recent trust values that each CH carries. Based on trust ratings,
value nodes were also found. The CHs engage in multi hop routing using the projected protocol,
which selects the best routes depending on latency, performance, and connection within the
boundaries of the course. [4]
R. Thiagarajan and R Ganesan, a system for detecting malicious nodes at each destination was
proposed in Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in
MANET in 2021. Following the detection procedure, it is isolated and discarded while the path is
established using other techniques. Paths for a group of disparate nodes can be found with the aid
of an algorithm that enables multipath reliable routing. The pathways are reordered based on the
reliability index. [5]
In their article published in March 2020, Neenavath Veeraiah and B. T. Krishna offer a method
for safe multipath routing and intrusion detection in MANET [22]. The approach uses an
optimization algorithm as its foundation offer MANET with effective multipath routing. In order
to effectively address the energy and security problems in the MANET, the cluster head (CH)
3. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
129
selection and intrusion detection algorithms, also known as fuzzy clustering and fuzzy Naive
Bayes, are utilise (fuzzy NB). The bird swarm-whale optimization algorithm, also known as
BSWOA, it is then utilised in order to further multipath routing by utilising secure nodes.
BSWOA is a combination of the bird swarm optimization algorithm (BSA) and the whale
optimization algorithm (WOA). [6,7,21]
Deepak Sinwar, Nisha Sharma, DSDV, AODV, and AOMDV discussed an ant colony
optimization algorithm based on shortest path in MANET in 2020. Ant-Colony Optimization
(ACO) and Particle Swarm Optimization are two Swarm Intelligence (SI)-based methodologies
that have been used to address the demand for an optimum path for communication among nodes
(PSO). The protocol must be optimised to choose the best way in order to extend the length of
communication availability. These many routing issues can be resolved using SI-based
techniques. ACO offers the best packet delivery speed, throughput, power efficiency, and packet
delay. [8]
In 2018, G.M Borkar and A.R Mahajan introduce “The Security Aware Dual Authentication
Based Routing (SDAR) and Highly Efficient Dual Authenticated Routing (HEDAR). It uses
Fuzzy logic control (FLC) based prediction algorithm and game theory. Cipher text policy
attribute-based encryption (ABE) is used for secure transmission. Evaluate several assessment
measures of node density levels. [9,19,27]
Nada Mouchfiq, in 2019 explains network security using the Blockchain to enable the adoption of
new processes, enable the exchange of messages and information, and enable autonomous device
coordination. they put up a security approach called "MPR Blockchain" it is based on the
Blockchain and is more suited to our needs as a group working in ad hoc networks. [10]
David Cordova, Alexandre Laube explain in 2020, blockgraph: A blockchain for mobile ad hoc
Networks, which we refer to as "blockgraph," discusses the difficulties in adopting a DAG-based
blockchain for MANETs. We describe blockgraph features. This contains a consensus mechanism
that is resilient to network partitions, blockgraph protocol specifications that maintain the
blockgraph data structure, and a group management system that responds to network topology
changes and provides the block graph framework with topological information. [11]
Masood uses blockchain to illustrate reputation-based routing in MANET. The difficulty level
and score are then combined to determine a node's reputation. The quickest, most reputable path
between a source and destination node is determined using this reputation as part of a novel
routing metric. By barring malicious nodes from participating in packet routing, the intention is to
deter them from being malicious. In the context of routing threats, a combined simulation of the
Blockchain and routing algorithm demonstrates an improvement in overall packet delivery [12].
Bhagyalakshmi proposed Q-AODV [13]: A Flood Control Ad-Hoc on Demand Distance Vector
Routing Protocol known as Q-AODV seeks to reduce the number of intermediary nodes involved
in the route discovery process in order to minimize the overall volume of control packets
forwarded by network nodes. This is accomplished by using the queue length of the node to
control the route request (RREQ) broadcast storm. At each intermediary node, the queue vacancy
proportion is compared with the random number that the source appends with RREQ. The
intermediate node broadcasts the RREQ packet if the randomly generated number is less than the
proportion of queue vacancies. Decreasing the number of crowded nodes forwarding the RREQ
packets, lengthens the network's total lifespan and enhances QoS metrics. The proposed algorithm
Q-AODV is an enhancement to AODV that searches for a less congested route depending on
queue vacancies. The proposed technique QAODV somewhat lowers jitter, average end-to-end
delay, and throughput compared to AODV [13,17,18].
4. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
130
N. Prasath and J. Sreemathy. The performance of the optimized dynamic source routing protocol
(DSR) for MANETs is examined in the 2018 article, Describe Optimized dynamic source routing
protocol for MANETs. The Firefly algorithm is used to modify the conventional DSR algorithm
in order to determine the best routes between the communication nodes. In order to increase DSR
routing performance with well-organized packet transfers from the source to the destination node,
the suggested technique on MANET uses the Firefly algorithm. Based on link quality, node
mobility, and end-to-end delay, the best path is discovered. [14]
Ravilla Dilli, 2016, discusses Security features in MANETs using the Secured Hash Algorithm
(SHA3-256) for secured routing in Mobile Ad hoc Networks' hybrid routing technique
(MANETs). To ensure data integrity and authenticity, he employed the Hashed Message
Authentication Code (HMAC). Zone Routing Protocol was the hybrid routing method employed
(ZRP). [15]
In January 2015, B. Madhusudhanan et al. created a mobility-based key management technique
for mobile ad hoc networks' multicast security. A node's anticipated stability index, which is
based on link availability and mobility, is used to first group them. Every weak node in a
multicast tree has a strong parent node and vice versa. To send multicast data, a session key-based
encryption mechanism is used. Regularly, the initiator node conducts the rekeying process.
Because the rekeying interval is a constant dependent on the node type, this technique drastically
minimises the rekeying overhead. [16]
3. PROPOSED SCHEME
As there will be many nodes connected to the network, QoS will affect the delay factor. When
addressing the problem of the network attack, this study cannot ignore the factor of delay. The
most important factor in determining the effectiveness of an ad hoc network is delay. The data
takes longer to reach the goal node than expected. Multiple linked nodes and network mobility
are the main causes of delay in the intelligent world. The suggested plan guarantees network
security while lowering the latency factor.
A huge number of nodes are used to calculate the delay. The number of connections and the
length of pauses between the nodes (devices) will reduce latency [1]. Smart network nodes store
information about nearby nodes and base their decisions on the outcomes. Nodes keep an eye on
whether the nearby device nodes provide a significant contribution. The criteria of delay are used
to make the choice. The actual node is removed from the network following the estimated time
after reviewing the surrounding node's response time. This also employs an algorithm to provide
accurate information for making decisions. Before the target node is reached, the entire process
will be looped.
Algorithm: Reducing the mobile ad hoc network delay value to a minimum using the SRABC
scheme
Input: Node parameter
Output: Reduce the node parameter function(delay)
Step I: A network with separate mobile nodes and parameters is specified.
Step II: Source and destination node configuration as Sr and Dt.
Step III: Using the AODV protocol, build routes between source and destination. The route is
described as Sr, R1, R2, R3... Rn, Dt.
Step IV: For a=1 to n (repeat steps IV to VIII)
Step V: RList find adjacent (a)
For b-1 to length (RList)
5. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
131
{
Step VI: Parameter = Packet
Delay (b)
Step VII: Using Fuzzy Logic for parameter fuzzification
Step VIII: If the parameter Delay =low
{ Set Rlist(a) as the next communicating node }
}
Step IX: Go to the following next node.
Step X: Finish
Using the cutting-edge algorithm that successfully reduces the delay factor for the significant
number of blockchain technology nodes that are connected. The effectively avoid attacks,
blockchain technology has suggested the development of a revolutionary Relinquished
Blockchain Based Integrity System then to determine the network system's dependability.
4. PROPOSED SCHEME
This section offers a thorough explanation of the execution of this suggested system's findings,
performance, and comparison methodologies.
4.1. A Test Based Setup
This study was implemented in Python using the following system specifications and simulation
results. Windows Python 3.7 4GB RAM, Intel Core.
4.2. Performance Metrics
BCR's simulation is evaluated using metrics such as the Packet delivery ratio, average
throughput, end-to-end delay (number of dropped packets), routing overhead (latency in acquiring
routes), block height (deposit address), minimum difficulty (number of nodes), movement speed
(transmission range), simulation time (latency in generating blocks), and so on When a route
request has expired, Blacklisted addresses, a route selected, a timer for the blacklist, and the
validity of the route offer are all included in this section.
4.2.1. Packet Delivery Ratio
The ratio of the total number of packets [20] transmitted to the total number of packets delivered
from the source node to the network destination node is known as the packet delivery ratio
(PDR). It is advantageous to send every data packet to its intended location. The PDR value also
improves the effectiveness of the network.
100
Re
Packets
Sent
Packets
ceived
PDR
4.2.2. Throughput
The receiver receives a specific number of data packets in a given amount of time. Typically, it is
calculated in bits per second.
Time
Total
Packets
of
Number
Throughput
received
6. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
132
4.2.3. End-to-End Delay
End-to-end delay sometimes referred to as one-way delay, is the length of time it takes a packet to
move from source to destination over a network. Widespread in use, in-network surveillance
differs from round-trip time RTT in that just one path is measured from source to destination.
R
L
N
d end
to
end
4.2.4. Routing Overhead
The number of packets sent for maintenance and path discovery can be considered.
packets
data
of
Sum
packets
routing
of
Sum
Overhead
Routing
4.2.5. Route Acquisition Latency
This is the amount of time that passes between a source sending a request/discovery packet to a
destination to determine the path and receiving the ensuing first response. The first transmission
sending period has been used for the latency measurement if a path demand needs to be
retransmitted because it was timed.
4.2.6. Block Height
The block height of a particular block determines how many blocks must come before the
blockchain. The genesis block was referred to as a blockchain's very first block. Since there are
no preceding blocks in the blockchain, there is a zero block height. The length of the blockchain
is less than one is frequently used to quantify the cumulative block-chain height of the most
recent block. The biggest block is on the blockchain.
1
chain
block
height
Block
4.2.7. Deposit Address
A deposit address is a transitional address on a native network of cryptocurrency used to connect
deposits on a Gate Hub platform with individual user wallets. The user is not included in the
registry addresses created by Gate Hub (for cryptocurrencies other than XRP).
4.2.8. Maximum Difficulty
The length of time it takes miners to add fresh blocks of transactions to the blockchain is
controlled by a quantity called the difficulty.
1
arg
_
max et
t
imum
difficulty
Maximum
4.2.9. Number of Nodes
A blockchain is created from data blocks. A system that has a complete copy of the blockchain
transaction history is referred to as a complete node.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
133
4.2.10. Simulation Time
The amount of time it takes for a system or process to complete its whole execution, including all
of the internal sub-processes. The measurement is in seconds.
4.2.11. Block Generation Latency
The time it takes to construct the following block of transactions in the chain is the network
latency, commonly referred to as "block time." In other words, it refers to the amount of time a
user must wait after clicking the transmit button before seeing their transaction appear on the
blockchain.
4.2.12. Simulation Outputs
The following figures are an analysis of the simulation output. Create the blockchain network first
at random. After then, the blockchain is built in the MANET, the node is identified by its
pertinent weight, and communication takes place within the MANET. Additionally, the
transaction has been completed in MANET by determining the shortest path for communication.
Finally, a variety of assaults are taken into account in the dataset during training, and a variety of
attacks in the dataset have been verified through training and testing.
Figure 1. Node creation in block-chain. Figure 2. Shortest path calculation.
Figure 1, depicts the establishment of a node with the appropriate weight in the MANET block-
chain. Following the creation of the block and hashing of the data, a node is constructed using a
blockchain, with each node having the proper weight. The determination of the shortest way to
deliver the data from one node to the following node is shown in Figure 2. The shortest path will
be from node 11 to node 19 and from node 19 to node 15, where node 11 is the source node and
node 15 is the destination node. If node 12 is used, it will take two nodes to get there.
4.3. Simulation Output without Blockchain in MANET
The following figures show the simulation outcome without a blockchain. Without taking into
account blockchain metrics like throughput, average end delay, packet delivery ratio, and routing
overhead, the following result was calculated for 5 nodes and 100s of time.
The throughput against time without blockchain security is shown in Figure 3. According to this
finding, throughput in the 20s is 400 packets, it progressively climbs to 700 packets in the 40s,
reaches 950 packets in the 60s, 1590 packets in the 80s, and 1780 packets in the 100s.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
134
Figure 3. Throughput vs time for without blockchain security.
The average end latency over time without blockchain is shown in Figure 4. This graph shows
that when the pause duration increases over time, the average end delay does as well. When the
pause time reaches 100, the average end delay is 22.0 seconds. Also indicates that as the nodes
expand to five, the end-to-end delay also increases and reaches one millisecond (ms) without
blockchain.
Figure 4. Average end delay vs time for without Blockchain.
The packet delivery ratio over time for no blockchain is shown in Figure 5. This finding indicates
that as time increases effectively, the packet delivery ratio also rises and reaches 89.5 percent for
100s.
The routing time versus overhead for no blockchain is shown in Figure 6. Without blockchain,
this graph shows that the latency grows to 100s and the routing overhead reaches 69 percent.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
135
Figure 5. Packet delivery ratio vs time for without Blockchain.
Figure 6. Routing overhead ratio vs time for without Blockchain.
Table 1, depicts the parameters vs time without blockchain in MANET. Throughput, average end
delay, packet delivery ratio, and routing overhead [25] were taken into consideration for the
parameters in that table, which took into account the time between 20s and 100s. When the time
is 20 seconds, the throughput reaches 400 packets, the average delay reaches 18.3 seconds, the
packet delivery ratio reaches 70%, and the routing overhead reaches 10%. If the time is 40s, then
the throughput attains 700 packets, the average delay attains 19.1s, the packet delivery ratio
achieves 76 percent, and the routing overhead attains 23 percent.
Table 1. Parameters vs time without blockchain in MANET.
Time
(s)
Throughput
(packets)
Average end
delay(s)
Packet delivery
ratio (%)
Routing
overhead (%)
20 400 18.3 70 10
40 700 19.1 76 23
60 950 20 79.5 38.4
80 1590 21.3 84 49
100 1780 22 89.5 69.8
10. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
136
If the time is 60s, then the throughput attains 950 packets the average delay attains 20s, the packet
delivery ratio achieves 79.5 percent, and the routing overhead attains 38.4 percent. If the time is
80s, then the throughput attains 1590 packets, the average delay attains 21.3s, the packet delivery
ratio achieves 84 percent, and the routing overhead attains 49 percent. If the time is the 100s, then
the throughput attains 1780 packets, the average delay attains 22s, the packet delivery ratio
achieves 89.5 percent, and the routing overhead attains 69.8 percent. Table 2 shows the
parameters vs nodes without blockchain in MANET.
Table 2. Parameters vs node for without blockchain.
Node End to delay (ms) Packet delivery ratio (%) Routing overhead (%)
1 0.2 20 14.6
2 0.38 30 21
3 0.59 40 28.8
4 0.8 50 35
5 0.96 60 43.6
For MANET without blockchain, table 2 above compares the parameters and nodes. Variables
including average end delay, packet delivery ratio, and routing overhead were taken into
consideration in addition to the 5 nodes. In the case when the node is 1, the end-to-end delay is
0.2 milliseconds, the packet delivery ratio is 20%, and there is a 14.6 percent routing cost. The
end-to-end delay, packet delivery rate, and routing cost are all 0.38 milliseconds, 30%, and 21%,
respectively, when the number of nodes is increased to 2. The end-to-end delay, packet delivery
rate, and routing overhead all decrease to 0.59 milliseconds, 40%, and 28.8% respectively, when
the number of nodes is increased to 3. The end-to-end delay increases to 0.8 ms, the packet
delivery rate increases to 50%, and the routing overhead reach at 35% when the number of nodes
is increased to 4. The end-to-end delay, packet delivery rate, and routing overhead all increase to
0.96 ms, 60%, and 43.6%, respectively, when the number of nodes is increased to 5.
4.4. Simulation Output with Blockchain in MANET
In the following graphics, the simulation output using blockchain in MANET is discussed. The
results are shown in the figures below for relevance weight, model accuracy, model loss,
confusion matrix, and security level.
Figure 7. Relevance vs weight. Figure 8. Model accuracy of the dataset.
The relationship between relevance and weight is depicted in Figure 7. According to relevance,
the weight will progressively increase before decreasing. The data set's model accuracy is shown
11. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
137
in Figure 8. The accuracy and epoch are plotted using the training dataset and the test dataset.
When compared to the test dataset, the training dataset's accuracy will be very high.
Figure 9. Model loss of dataset. Figure 10. Confusion matrix for classification.
Figure 9 shows the relationship between the loss and the period. The loss relative to the test
dataset will be very little as the training dataset is gradually reduced. And the confusion matrix
for classification is displayed in Figure 10. The dataset takes into account a variety of attacks,
including Black hole [18], Grey, Warm, Sybil, Altered/Replayed, Spoof Routing, Sinkhole, Hello
Flood, and DOS-Apache2 attacks. The total dataset will then be 10,028 in this approach. After
6893 datasets successfully identify the attack, 3079 datasets are incorrectly categorised. Attacks
or normal behaviour are unpredictable by 526 datasets. Finally, 9502 datasets successfully
categorize attacks that are normal or malicious.
Figure 11. Security Level in Blockchain.
Figure 11 shows the relationship between the blockchain's security level and the number of
nodes. The graph shows that the security level will reach a maximum of 99 percent if the number
of nodes is modest. The security level slowly declines and reaches 97.5 percent as the number of
nodes rises.
4.5. Comparison Strategies
Ad hoc On-Demand Distance Vector (AODV) [17,18], Queue Ad hoc On-Demand Distance
Vector (QAODV), Dynamic Source Routing (DSR), Secured Encryption Technique with
Optimum Route Discovery (SETORD), and Highly Efficient Dual Authenticated Routing
(HEDAR) schemes are some of the algorithm schemes with which the performance of the
12. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
138
proposed method is compared in this section. The following diagram shows how the comparison
process works.
Figure 12. Comparison for Packet Delivery Ratio.
When comparing the packet delivery ratio with earlier approaches like DSR, AODV [17,18], and
QAODV, the resulting plot is shown in Figure 12. The graphic makes it obvious that the new
strategy has a high packet delivery ratio when compared to the earlier approaches. This
successfully implemented strategy lowers packet loss.
When the proposed method was compared to earlier technologies like SETORD and HEDAR,
Figure 12 shows the comparison plot between packet delivery ratio and the number of nodes. The
chart makes it obvious that, as compared to the earlier method, the Packet delivery ratio reaches
its maximum.
Figure 13. Comparison for Throughput
The results of the comparison between the prior and the proposed method in terms of throughput
in packets are shown in Figure 13. The proposed method assures a high delivery rate because it
has a high throughput when compared to earlier technology.
While the proposed method was compared to earlier technologies like SETORD and HEDAR,
Figure 13 shows the comparison plot between Throughput and the number of nodes. The figure
makes it obvious that throughput increases in comparison to the previous technique.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
139
Figure 14. Comparison for Packet Dropped.
Figure 14 shows comparative results between the methods used in the past and those suggested to
determine how many packets were dropped in the MANET. The resulting graph demonstrates
that the suggested approach does indeed achieve the lowest packet drop rate.
Figure 15 illustrates the end-to-end latency comparison between the proposed network and the
prior networks for data packets in the MANET. Thus, the graph shows improved performance for
the packets' end-to-end delay in the suggested technique.
Figure 15 illustrates the comparison between the proposed technique and earlier methods like
SETORD and HEDAR in terms of the end-to-end delay and number of nodes. The figure makes it
evident that the end-to-end delay is ineffective when compared to the earlier technique.
Figure 15. Comparison for End to end delay.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
140
Figure 16. Comparison for Routing overhead.
The resultant plot between the old ways and the new method of routing overhead [26] in the
MANET is shown in Figure 16. The graph demonstrates that the suggested method achieves
reduced routing overhead in the blockchain MANET as a result.
The parameters for a previous approach and the proposed method are contrasted in Table 3. When
compared to older methods like SETORD, Which has a packet delivery ratio of 99.1 percent, and
HEDAR, which has a packet delivery ratio of 99.5 percent, the characteristics also vary
depending on the number of nodes used. When compared to SETORD's 1787 kb/s and HEDAR's
1986 kp/s, the throughput is 2650 kb/s. End-to-end delays measured using the suggested approach
are 19.5 ms, SETORD is 22 ms, and HEDAR is 21 ms. Finally, the routing overhead of SETORD
reaches 69.8%, HEDAR reaches 59.9%, but the suggested technique reaches 44.2 percent.
Table 3. Comparison table for Packet delivery ratio, Throughput, end-to-end delay, and Routing Overhead.
Methodologi
es
Number of
Nodes
Packet
Delivery
Ratio (%)
Throughput
(kbps)
End-to-end
Delay (ms)
Routing
Overhead
(%)
SETORD 20 95 395 18.3 10
40 96.2 696 19.1 21.2
60 97 956 20 38.3
80 98.2 1564 21.2 47.9
100 99.1 1787 22 69.8
HEDAR 20 96 517 17.3 9
40 96.8 837 18 28.4
60 97.5 1156 19.1 32.5
80 98.6 1763 20.1 45.2
100 99.5 1986 21 59.9
Proposed 20 98.6 650 15 8.9
40 98.8 960 17.8 19.6
60 99.1 1350 18.2 30.1
80 99.3 1980 19.1 36.5
100 99.6 2650 19.5 44.2
15. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
141
Thus, when compared to earlier methods, the MANET method for blockchain technology
provides more efficiency. Table 4 shows the comparison between the existing method and the
proposed method with various parameters calculated.
Table 4. Comparison of an existing method with the proposed method.
Methodologies Packet
delivery ratio
(%)
Throughput
(Packets)
Number of
packets
dropped
Average end to end
delay(s)
DSR 91 6500 100 0.219
AODV 94 6800 89 0.21
QAODV 96 7000 87 0.208
Proposed 98 8500 69 0.20
According to table 4 above, the suggested technique would achieve a packet delivery rate of 98
percent, a throughput of 8,500 packets, 69 packets that are dropped in the proposed system, and
an average end-to-end delay of 0.20 seconds.
Figure 17 shows the results for the QoS settings. The throughput and packet delivery ratio both
increased, which led to better efficiency. The smallest end-to-end delay and least amount of
dropped packets show improved performance of the suggested strategy. Overall, the suggested
method suggested effective QoS Outputs.
Figure 17. Percentage of QoS for various QoS parameter.
Figure 18 displays attack detection for a variety of assaults, including Blackhole [17], Grey,
Warm, Sybil, Altered/Replayed or Spoofed Routing, Sinkhole, Hello Flood, DOS-Apache2
Attack, R2L, and Probe Attacks.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
142
Figure 18(a). Attack detection for various attacks.
Figure 18(b). Attack detection for various attacks.
Thus, the graph shows that when the proposed method is compared to the prior method, the black
hole attack is detected with 95% accuracy, the grey hole attack with 97% accuracy, the warm hole
attack with 92% accuracy, the Sybil hole attack with 94% accuracy, the spoofed routing attack
with 98% accuracy, the sink hole attack with 96% accuracy, the hello food attack with 94%
accuracy, and the DOS attack-Apache2 attack with 98% accuracy. Table 5 shows the comparison
between the prior methods and the proposed method for Attack detection (%). Table 5 depicts a
comparison between the prior methods and the proposed method for attack detection with
percentages.
Thus the graph reveals that the proposed method attains 95% of attack detection when compared
with AODV attains 60% of attack detection, SETORD attains 75% and Table 5 compares the
suggested method for attack detection with the existing methods using percentages. In contrast to
AODV's attack detection rate of 60%, SETORD's attack detection rate of 75%, and HEDAR's
attack detection rate of 79%, the suggested method achieves 95% attack detection in black hole
attacks, according to the graph.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
143
Table 5. Comparison between the prior methods and proposed method for Attack detection (%).
Methodologies
Attack
AODV
(%)
SETORD
(%)
HEDAR
(%)
Proposed
(%)
Black hole 60 75 79 95
Grey hole 63 74 82 97
Warm hole 68 79 87 92
Sybil 65 69 84 94
Altered/Replayed or
Spoofed
69 72 88 98
Sinkhole 64 74 78 96
Hello flood 66 76 85 94
DOS attack-Apache2 62 71 89 98
R2l 65 69 83 93
Probe 69 73 89 97
In comparison to AODV, SETORD, and HEDAR, which each achieve 63, 74, and 82 percent of
attack detection in Grey hole attacks, the suggested technique achieves 97 percent attack
detection. In comparison to AODV's attack detection rate of 60%, SETORD's attack detection
rate of 75%, and HEDAR's attack detection rate of 79%, the suggested approach detects attacks in
black hole attacks at a rate of 95%. Comparing the suggested method to AODV, SETORD, and
HEDAR, which each achieve 68, 79, and 87 percent attack detection in warm hole attacks, the
proposed method achieves 92 percent attack detection. Additionally, the suggested method
detects attacks at a rate of 94% compared to AODV's attack detection rate of 65%, SETORD's
attack detection rate of 69%, and HEDAR's attack detection rate of 84% in the Sybil assault.
The suggested method achieves 98 percent attack detection in altered/replayed or spoof attacks
compared to AODV's 69 percent attack detection, SETORD's 72 percent attack detection, and
HEDAR's 88 percent attack detection. The suggested method also achieves 96 percent attack
detection in comparison to AODV's attack detection rate of 64 percent, SETORD's attack
detection rate of 74 percent, and HEDAR's attack detection rate of 78 percent in sinkhole attacks.
The suggested technique thus achieves 94 percent attack detection in the Hello Flood Attack
compared to AODV's 66 percent attack detection, SETORD's 76 percent assault detection, and
HEDAR's 85 percent attack detection. As opposed to AODV's attack detection rate of 62%,
SETORD's attack detection rate of 71%, and HEDAR's attack detection rate of 89%, the
suggested technique detects attacks against Apache2 with 98 percent accuracy. The proposed
technique thus achieves 93 percent attack detection in R21Attack compared to AODV's 65
percent attack detection, SETORD's 69 percent attack detection, and HEDAR's 83 percent attack
detection. The suggested method thus achieves 97 percent attack detection in Probe Attack
compared to AODV's attack detection rate of 69 percent, SETORD's attack detection rate of 73
percent, and HEDAR's attack detection rate of 89 percent. As a result, the suggested system will
be more effective than both existing systems and those that do not use blockchain.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
144
5. CONCLUSIONS
SRA with blockchain improves MANET security. Insufficient network integrity and dependence
management cause the delay. SRA recommends using a Blockchain-Based Integrity System to
improve security. Implement Promulgated Reliance Esteemed Quadruplets Condition in
blockchain technology to boost system stability and scalability. Blockchain connects more
networks to infect QoS caused by delay. The blockchain-based SAR will reduce latency. The
findings show that the proposed framework improves several parameters, such as a high packet
delivery ratio, a high throughput, a reduced number of dropped packets, and a minimised end-to-
end delay, thereby improving the effectiveness of security in MANET through the use of
blockchain technology and the subsequent transmission of data based on performance metrics.
We will continue investigating blockchain and its application in mobile ad hoc networks in the
upcoming work. We want to learn more about the potential security risk and assaults that
blockchain in MANET thwarts. More research on hash consensus methods, malicious node
detection, optimal routing patterns, and improvement between two nodes could be done to
enhance this design. Additional studies in the fields of content creation, contribution, and
transmission are also included.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
ACKNOWLEDGMENTS
I like to thank Dr. Raj Thaneeghavl. V., my primary supervisor, for guiding me through this
study. In addition, also I would like to thank all authors for their contributions and the success of
this manuscript and all editors and anonymous reviewers of this manuscript.
REFERENCES
[1] Munisha Devi and Nasib Singh Gill “Novel Algorithm for Enhancing MANET Protocol in Smart
Environment” , International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8 Issue-10, August 2019, Blue Eyes Intelligence Engineering & Sciences
Publication, http://www.doi.org/10.35940/ijeat.A9882.109119
[2] Lu, C.-F., Hsu, C.-L., & Lin, H.-Y. (2012). Provably convertible multi-authenticated encryption
scheme for generalized group communications. Information Sciences, 199, 154–166.
https://doi.org/10.1016/j.ins.2012.02.051
[3] Jake Frankenfield “Cryptographic Hash Functions” Updated May 20, 2022 [online] Available at:
https://www.investopedia.com/news/cryptographic-hash-functions/
[4] U. Srilakshmi et al.: Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks,
VOLUME 10, 2022, pp 14260 - 14269 https://doi.org/10.1109/ACCESS.2022.3144679
[5] Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021).
Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET. Wireless
Personal Communications, 119(1), 21–35. https://doi.org/10.1007/s11277-021-08092-0
[6] Veeraiah, N., & Krishna, B. T. (2020). An approach for optimal-secure multi-path routing and
intrusion detection in MANET. Evolutionary Intelligence. https://doi.org/10.1007/s12065-020-00388-
7
[7] N. Veeraiah et al.: Trust Aware Secure Energy Efficient Hybrid Protocol for, MANET IEEE Access,
VOLUME 9, 2021, https://doi.org/10.1109/ACCESS.2021.3108807
[8] Sinwar, D., Sharma, N., Maakar, S. K., & Kumar, S. (2020). Analysis and comparison of ant colony
optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET. Journal
of Information and Optimization Sciences, 41(2), 621–632.
https://doi.org/10.1080/02522667.2020.1733193
19. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
145
[9] Borkar, G. M., & Mahajan, A. R. (2020). A review on propagation of secure data, prevention of
attacks and routing in mobile ad-hoc networks. International Journal of Communication Networks and
Distributed Systems, 24(1), 23. http://dx.doi.org/10.1504/IJCNDS.2020.10025198
[10] Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara, “Blockchain Security in MANETs” World
Academy of Science, Engineering and Technology, International Journal of Computer and
Information Engineering, Vol:13, No:10, 2019, pp 546-550 https://doi.org/10.5281/zenodo.3566283
[11] Cordova, D., Laube, A., Nguyen, T.-M.-T., & Pujolle, G. (2020). Blockgraph: A blockchain for
mobile ad hoc networks. 2020 4th Cyber Security in Networking Conference (CSNet).
https://doi.org/10.1109/CSNet50428.2020.9265532
[12] Careem, M. A. A., & Dutta, A. (2020). Reputation based Routing in MANET using Blockchain. 2020
International Conference on COmmunication Systems & NETworkS (COMSNETS).
https://doi.org/10.1109/COMSNETS48256.2020.9027450
[13] Bhagyalakshmi, & Dogra, A. K. (2018). Q-AODV: A Flood Control Ad-Hoc on Demand Distance
Vector Routing Protocol. 2018 First International Conference on Secure Cyber Computing and
Communication (ICSCCC). https://doi.org/10.1109/ICSCCC.2018.8703220
[14] Prasath, N., & Sreemathy, J. (2018). Optimized dynamic source routing protocol for MANETs.
Cluster Computing. https://link.springer.com/article/10.1007%2Fs10586-017-1638-1
[15] Dilli, R., & Reddy, P. C. S. (2016). Implementation of security features in MANETs using SHA-3
standard algorithm. 2016 International Conference on Computation System and Information
Technology for Sustainable Solutions (CSITSS). https://doi.org/10.1109/CSITSS.2016.7779410
[16] Madhusudhanan, B., Chitra, S., & Rajan, C. (2015). Mobility Based Key Management Technique for
Multicast Security in Mobile Ad Hoc Networks. The Scientific World Journal, 2015, 1–10.
https://doi.org/10.1155/2015/801632
[17] Huy D. Le et al.: AODVMO: A SECURITY ROUTING PROTOCOL USING ONE-TIME
PASSWORD AUTHENTICATION MECHANISM BASED ON MOBILE AGENT, IJCNC Vol.14,
No. 13, May 2022, 17–35. https://doi.org/10.5121/ijcnc.2022.14302
[18] Patil, L. H., & Borkar, G. M. (2018). An Adaptive RIPng Routing Protocol with Secure Packet
Transmission in MANETs. Journal of Applied Security Research, 1–27.
https://doi.org./10.1080/19361610.2018.1499385
[19] Borkar, G. M., & Mahajan, A. R. (2018). Security aware dual authentication-based routing scheme
using fuzzy logic with secure data dissemination for mobile ad-hoc networks. International Journal of
Communication Networks and Distributed Systems, 21(2), 157.
https://doi.org/10.1504/IJCNDS.2018.094218
[20] Ramamoorthy, R., & Thangavelu, M. (2021). An enhanced hybrid ant colony optimization routing
protocol for vehicular ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing.
doi.org/10.1007/s12652-021-03176-y
[21] Halhalli, S.R., Sugave, S.R. and Jagdale, B.N. (2021) ‘Optimisation driven-based secure routing in
MANET using atom whale optimisation algorithm’, Int. J. Communication Networks and Distributed
Systems, Vol. 27, No. 1, pp.77–99, [DOI] https://dx.doi.org/10.1504/IJCNDS.2021.116484
[22] Venkatasubramanian, S. (2022). Fruit-Fly Algorithm Based Dynamic Source Routing Algorithm for
Energy Efficient Multipath Routing in MANET. 2022 International Conference on Computer
Communication and Informatics (ICCCI). https://doi.org/10.1109/iccci54379.2022.9740906
[23] Nitesh Ghodichor, Raj Thaneeghaivl. V, Varsha Namdeoe, Gautam Borkar, Year: 2022, “Secure
Routing Protocol against Internal and External Attack in MANET”, THEETAS, EAI,
https://eudl.eu/doi/10.4108/eai.16-4-2022.2318163
[24] Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021).
Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET. Wireless
Personal Communications, 119(1), 21–35. https://doi.org/10.1007/s11277-021-08092-0
[25] Almazok, S. A., & Bilgehan, B. (2020). A novel dynamic source routing (DSR) protocol based on
minimum execution time scheduling and moth flame optimization (MET-MFO). EURASIP Journal
on Wireless Communications and Networking, 2020(1). doi:10.1186/s13638-020-01802-5
[26] Nagaraj Balakrishnan, Arunkumar Rajendran, Ajay P. "Deep Embedded Median Clustering for
Routing Misbehaviour and Attacks Detection in Ad-Hoc Networks", Ad Hoc Networks, 2021
https://doi.org/10.1016/j.adhoc.2021.102757
[27] Gautam M. Borkar & Anjali R. Mahajan (2018) Security Aware Dual Authentication based Routing
Scheme using Fuzzy Logic with Secure Data Dissemination for Mobile Ad-hoc Networks, Journal of
Applied Security Research, 13:2, 223-249, https://doi.org/10.1080/19361610.2017.1387737
20. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023
146
AUTHORS
Nitesh Ghodichor is a Research Scholar at the Department of Computer Science &
Engineering, SRK University, Bhopal. Master of Technology in Computer science &
Engineering (2010). Bachelor of Engineering in Computer Technology (2001). after
Engineering has been working as a Lecturer at Nagpur university. I have published more
than 10 papers in Journal as an author and co-author with citation 28 and h-index 3.
Raj Thaneeghavl. V, Professor at the Department of Computer Science, SRK University,
Bhopal. He has completed Ph.D. in Computer Science in 2014, MCA in 2010, CCNA
certified, Engineering degree earned in 2005. Research Activities in a different area and
also research work published in more than 3 journals, more than 10 presentations.
Gautam M. Borkar received his Bachelor’s degree from the National Institute of
Technology, jalandhar, Punjab, India and completed his Master’s from the Sant Gadge
Baba Amravati University, Amravati. Currently, he is working as an Assistant Professor
in Rajiv Gandhi Institute of Technology, Mumbai and completed his PhD from the Sant
Gadge Baba Amravati University, Amravati. His current research interests include
network security, trust management and security in wireless sensor network.
Ankush Sawarkar a Ph.D scholar and I am very close to finishing my Ph.D. thesis at
Visvesvaraya National Institute of Technology (VNIT), Nagpur, in the Department of
Computer Science and Engineering. My broad areas of interests include Bamboo,
Artificial Intelligence, Machine Learning, Deep Learning, I did my Masters in Computer
Network and Information Security from Shri Guru Gobind Singhji Institute of Engineering
and Technology (SGGSIE&T) Nanded.