133 research outputs found

    Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet

    Full text link
    MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.Comment: https://aircconline.com/ijcnc/V15N2/15223cnc07.pd

    Efficient Routing in Mobile Adhoc Networks Emphasizing Quality of Service by Trust & Energy based AODV

    Get PDF
    Attention in the region of Mobile Ad-hoc Network (MANET) is increasing because of its realistic applications and necessity of communication in mobile devices. A mobile ad hoc network consists of mobile self configuring wireless nodes and these nodes communicate between them without any centralized management. The dynamic characteristics of MANET, has made it fairly demanding to uphold connectivity and guarantee Quality of Service (QoS). The trust based routing is one way to form cooperation among nodes for performing an efficient routing between nodes. In this paper a trust and energy based AODV is presented where nodes are selected for routing based on its trust and energy value. Trust is calculated based on the nodes success and failure rate. Energy calculated based on consumed and remaining energy values. A threshold value is defined and nodes are preferred for routing only if its trust and energy levels are higher than threshold. The work is implemented and simulated on NS-2. The simulation results have shown improvement on QoS metrics when compared with traditional AODV and DSR

    Performance Improvement in DSR and Comparitive Analysis with DSDV, AODV, DSR

    Get PDF
    Mobile ad-hoc network is an infrastructure less wireless network which have group of hosts. To communicate, these hosts on behalf of one another they transfer the packets. In an ad-hoc network there are many routing protocol. The most popular one ,out of them is dynamic source routing protocol(DSR).The most of the routing algorithms for MANET are designed for single source and single destination in the network. We have considered multiple source (two and three in our case) and single destination scenario. In our work we present some ideas or enhancements to the existing DSR protocol to make it more capable to tackle the above mentioned situation. We have taken our hypothesis of multiple source acting in network along with a single destination for high mobility area. Under this kind of situation also the performance of our network changes, as the nodes are mobile so the reputed routes (efficient route) keep on changing all the time and almost all the routing protocols are not capable of using the best routes for the optimum time as it would stick to the once captured route despite of the available good routes. So in our protocol ExDSR (Extended DSR) we tried to overcome this problem. To evaluate the performance of our proposed work different simulations have been conducted, considering various possible network parameters. We compared our protocol with the existing ones like AODV, DSDV and DSR and this novel protocol has shown better performance than the existing protocols under the mentioned scenarios

    A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks

    Get PDF
    With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years

    A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks

    Get PDF
    With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years

    A Trust and Node Capability Model for Reliable and Secure MANET Communication

    Get PDF
    The Mobile Ad-hoc Network (MANET) is a rapidly deployable network. That is valuable for industrial and domestic applications due to flexible, mobile, and wireless communication. But the network is constrained with resources and security. In this paper, we are presenting a node capability based trusted routing named TNC-AODV for MANET. It is a hybrid approach for maintaining route reliability and security. The model is composed of the property of node capability and Trust. The Node capability is defined by the quality of service parameters like remaining energy, available bandwidth, buffer length, and mobility pattern. The aim is to ensure the discovery of reliable routes. Additionally, the trust is implemented by using a local and global trust for securing the network. The TNC-AODV is implemented through modification of AODV routing. That routing technique has been tested on three security threats namely Black-hole, wormhole, and DOS flooding attack. The simulation has been carried out using the NS2 simulator. The experimental results demonstrate that TNC-AODV provides security against attacks. Additionally, improve the packet delivery ratio, and throughput. Finally, the possible and feasible future extension of the work has also been proposed

    Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks

    Get PDF
    This book presents collective works published in the recent Special Issue (SI) entitled "Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks”. These works expose the readership to the latest solutions and techniques for MANETs and VANETs. They cover interesting topics such as power-aware optimization solutions for MANETs, data dissemination in VANETs, adaptive multi-hop broadcast schemes for VANETs, multi-metric routing protocols for VANETs, and incentive mechanisms to encourage the distribution of information in VANETs. The book demonstrates pioneering work in these fields, investigates novel solutions and methods, and discusses future trends in these field
    corecore