Open Access Open Access  Restricted Access Subscription Access

Behavior Based High Performance Protocol for MANET


Affiliations
1 Department of Computer Science and Engineering, Cambridge Institute of Technology, Ranchi, Jharkhand, India
2 Department of Information Technology, Birla Institute of TechnologyMesra, Ranchi, India
 

This paper presents a Behavior Based High Performance (BBHP) protocol for MANET that involves the existing protocols and solutions to their best advantages instead of developing from scratch. Our system is defined as an intelligent system consisting of a behavior monitoring system, knowledge base, an inference engine and the execution system. The knowledge base consists of a set of rules defined using input and output metrics. The input metrics involve threats, mobility, network size and cooperation level and output metrics involve all the existing protocols and solutions used for secured routing. The inference engine decides the best solutions on the basis of observed behavior. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.

Keywords

Co-operation Level, Inference Engine, Rule Based System, Behavior Monitoring System, Execution System
User

  • Chowdhury M A H, Ikram M et al. (2008). Secure and survivable group communication over MANET using CRTDH based on a virtual subnet model, Asia-Pacific Services Computing Conference, 2008. APSCC ‘08. IEEE, 638–643.
  • Akhtar M A K, and Sahoo G (2013). A novel methodology for securing ad hoc network by friendly group model, Computer Networks & Communications (NetCom), vol 131, 23–35.
  • Saeed N H, Abbod M F et al. (2010). IMAN: An Intelligent MANET routing system, 2010 IEEE 17th International Conference on Telecommunications (ICT), 401–404.
  • Saeed N (2011). Intelligent MANET optimisation system.
  • Biswas K, and Ali M I (2007). Security threats in mobile Ad Hoc network, Master Thesis, Thesis no: CS-2007:07, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.
  • Ilyas M (2010). The handbook of Ad Hoc wireless networks, vol 29, CRC press.
  • Boukerche A (2008). Algorithms and protocols for wireless, mobile Ad Hoc networks, vol 77, John Wiley & Sons.
  • Anjum F and Mouchtaris P (2007). Security for wireless ad hoc networks, Wiley.com.
  • Michiardi P, and Molva R (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, 107–121.
  • Buchegger S, and Le Boudec J Y (2002). Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile Ad Hoc networking and computing, 226–236.
  • Buchegger S, and Le Boudec J Y (2002b). Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile Ad Hoc networks, 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Proceedings, 403–410.
  • Balasubramanian A, and Ghosh J (2005). A reputation based scheme for stimulating cooperation in MANETs, Proceeding-s of The 19th International Teletraffic Congress, Beijing.
  • Bajaj L, Takai M et al. (1999). Glomosim: a scalable network simulation environment, UCLA Computer Science Department Technical Report, 990027, 213.
  • GloMoSim (1999). Global Mobile Information System Simulator, Available from: http://pcl.cs.ucla.edu/projects/glomosim/
  • Das S R, Belding-Royer E M et al. (2003). Ad hoc on-demand distance vector (AODV) routing.
  • Hu Y C, Perrig A et al. (2003). Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, 1976–1986.
  • Akhtar M A K, and Sahoo G (2013). Humanistic approach in mobile Adhoc network: HAMANET, Third International Conference on Computer Science & Information Technology (CCSIT), 01–12, CS & IT-CSCP.
  • Marti S, Giuli T J et al. (2000). Mitigating routing misbehavior in mobile ad hoc networks, International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking, vol 6, No. 11, 255–265.
  • Johnson D B (2003). The dynamic source routing protocol for mobile Ad Hoc networks, draft-ietf-manet-dsr-09. txt.

Abstract Views: 448

PDF Views: 0




  • Behavior Based High Performance Protocol for MANET

Abstract Views: 448  |  PDF Views: 0

Authors

Md. Amir Khusru Akhtar
Department of Computer Science and Engineering, Cambridge Institute of Technology, Ranchi, Jharkhand, India
G. Sahoo
Department of Information Technology, Birla Institute of TechnologyMesra, Ranchi, India

Abstract


This paper presents a Behavior Based High Performance (BBHP) protocol for MANET that involves the existing protocols and solutions to their best advantages instead of developing from scratch. Our system is defined as an intelligent system consisting of a behavior monitoring system, knowledge base, an inference engine and the execution system. The knowledge base consists of a set of rules defined using input and output metrics. The input metrics involve threats, mobility, network size and cooperation level and output metrics involve all the existing protocols and solutions used for secured routing. The inference engine decides the best solutions on the basis of observed behavior. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.

Keywords


Co-operation Level, Inference Engine, Rule Based System, Behavior Monitoring System, Execution System

References





DOI: https://doi.org/10.17485/ijst%2F2013%2Fv6i10%2F38794