A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Akhtar, Md. Amir Khusru
- Behavior Based High Performance Protocol for MANET
Authors
1 Department of Computer Science and Engineering, Cambridge Institute of Technology, Ranchi, Jharkhand, IN
2 Department of Information Technology, Birla Institute of TechnologyMesra, Ranchi, IN
Source
Indian Journal of Science and Technology, Vol 6, No 10 (2013), Pagination: 5342-5350Abstract
This paper presents a Behavior Based High Performance (BBHP) protocol for MANET that involves the existing protocols and solutions to their best advantages instead of developing from scratch. Our system is defined as an intelligent system consisting of a behavior monitoring system, knowledge base, an inference engine and the execution system. The knowledge base consists of a set of rules defined using input and output metrics. The input metrics involve threats, mobility, network size and cooperation level and output metrics involve all the existing protocols and solutions used for secured routing. The inference engine decides the best solutions on the basis of observed behavior. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.Keywords
Co-operation Level, Inference Engine, Rule Based System, Behavior Monitoring System, Execution SystemReferences
- Chowdhury M A H, Ikram M et al. (2008). Secure and survivable group communication over MANET using CRTDH based on a virtual subnet model, Asia-Pacific Services Computing Conference, 2008. APSCC ‘08. IEEE, 638–643.
- Akhtar M A K, and Sahoo G (2013). A novel methodology for securing ad hoc network by friendly group model, Computer Networks & Communications (NetCom), vol 131, 23–35.
- Saeed N H, Abbod M F et al. (2010). IMAN: An Intelligent MANET routing system, 2010 IEEE 17th International Conference on Telecommunications (ICT), 401–404.
- Saeed N (2011). Intelligent MANET optimisation system.
- Biswas K, and Ali M I (2007). Security threats in mobile Ad Hoc network, Master Thesis, Thesis no: CS-2007:07, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.
- Ilyas M (2010). The handbook of Ad Hoc wireless networks, vol 29, CRC press.
- Boukerche A (2008). Algorithms and protocols for wireless, mobile Ad Hoc networks, vol 77, John Wiley & Sons.
- Anjum F and Mouchtaris P (2007). Security for wireless ad hoc networks, Wiley.com.
- Michiardi P, and Molva R (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, 107–121.
- Buchegger S, and Le Boudec J Y (2002). Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile Ad Hoc networking and computing, 226–236.
- Buchegger S, and Le Boudec J Y (2002b). Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile Ad Hoc networks, 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Proceedings, 403–410.
- Balasubramanian A, and Ghosh J (2005). A reputation based scheme for stimulating cooperation in MANETs, Proceeding-s of The 19th International Teletraffic Congress, Beijing.
- Bajaj L, Takai M et al. (1999). Glomosim: a scalable network simulation environment, UCLA Computer Science Department Technical Report, 990027, 213.
- GloMoSim (1999). Global Mobile Information System Simulator, Available from: http://pcl.cs.ucla.edu/projects/glomosim/
- Das S R, Belding-Royer E M et al. (2003). Ad hoc on-demand distance vector (AODV) routing.
- Hu Y C, Perrig A et al. (2003). Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, 1976–1986.
- Akhtar M A K, and Sahoo G (2013). Humanistic approach in mobile Adhoc network: HAMANET, Third International Conference on Computer Science & Information Technology (CCSIT), 01–12, CS & IT-CSCP.
- Marti S, Giuli T J et al. (2000). Mitigating routing misbehavior in mobile ad hoc networks, International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking, vol 6, No. 11, 255–265.
- Johnson D B (2003). The dynamic source routing protocol for mobile Ad Hoc networks, draft-ietf-manet-dsr-09. txt.
- Possibility and Necessity Measures to Enhance Reliability and Cooperation in MANETS
Authors
1 Infosys Limited, Chennai, IN
2 Department of Computer Engineering, Cambridge Institute of Technology, Ranchi, Jharkhand, IN
Source
Indian Journal of Science and Technology, Vol 7, No 3 (2014), Pagination: 312–317Abstract
Ensuring security in Mobile Ad hoc Network (MANET) is a major concern. The majority of attacks can be prevented by secure routing protocol, but non-cooperation still suffers from a serious drawback which is the total strength of nodes in a network. A lot of solution to enforce cooperation has been proposed in the literature which isolate nodes directly on the basis of lesser reputation values but reduces the total strength of nodes in a network. Finally, the lesser strength of nodes degrades the performance and reliability of mobile ad hoc networks.To enforce cooperation in MANET this work presents the Perfect Evidence (PE) model which uses reputation value to obtain the possibility and necessity measures and isolate a node having perfect evidence. It involves nesting of focal element to know the perfect evidence. The proposed model enhances performance of the network because it eliminates only one misbehaving node in each turn, which maintains the total strength of nodes in a network. In addition to that it enhances cooperation in network because it identifies and isolates the most misbehaving node and warns other misbehaved nodes. The warning message suggests other misbehaving nodes to cooperate in network activities otherwise at any turn it will be isolated from the network. Experimental result shows the efficiency of the model.