632 research outputs found

    Secure Routing Protocols Comparison Analysis Between RNBR, SAA, A-UPK

    Get PDF
    The advent of wireless communications and the development of mobile devices have made great strides in the development of roaming communications. The MANET mobile network was developed with the ability for mobile devices to quickly self-configure and extend wireless coverage without infrastructure support. Security is one of the most important areas of research and plays a vital role in determining the success of personal and commercial telephone systems.Therefore, this study focuses on systematically examining MANET security and accountability issues and analyzing the performance of solutions proposed by three different design approaches to security systems.First, it provides an approach for identifying trusted nodes employing the proposed RNBR method for secure routing.it provides a Self-Assured Assessment (SAA) method to estimate node stability. Its main goal is to contribute to a self-assessment-based reliability assessment mechanism that provides a reliable and reliable pathway.it provides a new authentication method to prevent forgery attacks. It supports authentication mechanisms to prevent RF attacks and ensure secure routing development.The main Objective of this paper is compare to packet delivery Ratio ,Control Overhead, Packet Drop Ratio in different secure RNBR,SAA,A-UPK Routing Protocols in MANETS

    Node activity based trust and reputation estimation approach for secure and QoS routing in MANET

    Get PDF
    Achieving safe and secure communication in MANETs is a key challenge due to its dynamic nature. A number of security studies disclose that reputation management systems are able to be effectual with less overhead. The reputation of a node is calculated by using automated assessment algorithms depend on predefined trust scheme. This paper proposes a Node Activity-based Trust and Reputation estimation (NA-TRE) approach for the security and QoS routing in MANET. NA-TRE aims to find trust estimation and reputation of a node. The NA-TRE approach monitors the activity changes, packet forwarding or dropping in a node to find the status of the node. The various activities of a node like Normal State (NS), Resource Limitation State (RS) and Malicious State (MS) are monitored. This status of a node is helpful in computing trust and reputation. In this paper NA-TRE approach compared with existing protocols AODV, FACE and TMS to evaluate the efficiency of MANET. The experiment results show that 20% increasing of throughput, 10% decrease of overhead and end to end delay

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks

    Get PDF
    Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location. But the open environment of wireless communication increasing threat on the wireless networks under diverse network circumstances. The random and dynamic activity increases the  vulnerability due to the complete dependency on the intermediate nodes which frequently join and leave the network. It is extremely significant to have a secure routing in such a dynamic network to preserve the data privacy. In this paper, we propose a secure and privacy routing based on Node Activities Learning (NAL) approach. This approach knows the runtime activities of the node to predict the probability of activity transformation for the intentional and unintentional activities which interrupt the data communication and affects the privacy. The mean of privacy is decided based on the node individual trust factor. It also suggests a method for the node which loses their trust due to the unintentional activities. A simulation-based evaluation study shows positive improvisation in secure routing in different malicious node environment

    A Novel Energy Aware Clustering Mechanism with Fuzzy Logic in MANET Environment

    Get PDF
    A Mobile Ad Hoc Networks (MANETs) comprises of the vast range of devices such as sensors, smart phones, laptops and other mobile devices that connect with each other across wireless networks and collaborate in a dispersed fashion to offer network functions in the absence of a permanent infrastructure. The Cluster Head (CH) selection in a clustered MANET is still crucial for lowering each node's energy consumption and increasing the network's lifetime. However, in existing clustering mechanism trust of the all nodes are presumed those causes increased challenge in the MANET environment. Security is a crucial factor when constructing ad-hoc networks. In a MANET, energy consumption in route optimization is dependent on network resilience and connectivity. The primary objective of this study is to design a reliable clustering mechanism for MANETs that takes energy efficiency into account. For trusted energy-efficient CH in the nodes, a safe clustering strategy integrating energy-efficient and fuzzy logic based energy clustering is proposed to address security problems brought about by malicious nodes and to pick a trustworthy node as CH. To improve the problem findings Bat algorithm (BAT) is integrated with Particle Swarm Optimization (PSO). The PSO technique is inspired because it imitates the sociological characteristics of the flock of the birds through random population. The BAT is a metaheuristic algorithm inspired by microbat echolocation behavior that uses pulse average with global optimization of the average path in the network. Hybrid Particle Swarm Optimization (HPSO) and BAT techniques are applied to identify the best route between the source and destination. According to the simulation results, the suggested Fuzzy logic Particle Swarm Optimization BAT (FLPSO-BAT) technique has a minimum latency of 0.0019 milliseconds, with energy consumption value of 0.09 millijoules, maximal throughput of 0.76 bits per sec and detection rate of 90.5% without packet dropping attack

    Trust Based Certificate Revocation for Secure Routing in MANET

    Get PDF
    AbstractMany trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation. In order to reduce the hazards from nodes and to enhance the security of network we propose to develop a CA distribution and a Trust based threshold revocation method. Initially the trust value is computed from the direct and indirect trust values. And the certificate authorities distributes the secret key to al the nodes. Followed by this a trust based threshold revocation method is computed. Here the misbehaving nodes are eliminated

    Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET

    Get PDF
    In wireless transmission, a Mobile Ad-hoc Network (MANET) contains many mobile nodes that can communicate without needing base stations. Due to the highly dynamic nature of wireless, MANETs face several issues, like malicious nodes making packet loss, high energy consumption, and security. Key challenges include efficient clustering and routing with optimal energy efficiency for Quality of Service (QoS) performance. To combat these issues, this novel presents Cooperative Self-Scheduling Secure Routing Protocol (CoS3RP) for efficient scheduling for proficient packet transmission in MANET. Initially, we used Elite Sparrow Search Algorithm (ESSA) for identifies the Cluster Head (CH) and form clusters. The Multipath Optimal Distance Selection (MODS) technique is used to find the multiple routes for data transmission. Afterward, the proposed CoS3RP transmits the packets based on each node authentication. The proposed method for evaluating and selecting efficient routing and data transfer paths is implemented using the Network simulator (NS2) tool, and the results are compared with other methods. Furthermore, the proposed well performs in routing performance, security, latency and throughput
    • …
    corecore