Detecting and Predicting Malicious Nodes in Mobile Ad-Hoc Networks using a Secure Technique

Main Article Content

Imran Khan
Pratik Gite

Abstract

Mobile Ad Hoc Networking (MANET) is a rapidly growing area of interest in the realm of communication frameworks. Because the MANET lacks a basis, it exhibits the dynamic character of a self-assertive network architecture. Security concerns are critical in these networks. Nodes in MANETs may launch a variety of attacks or become conspicuously self-centred to maintain their advantage. These nodes may be considered malicious. Identification of such malicious nodes is critical for the successful operation of MANETs. A collection of networks has been presented, but each one has its own set of constraints. The scope of this proposal is to conduct research on black hole, wormhole, collaborative malevolent, and flooding attacks, and to establish a network of counteractive measures using responsive directing conventions. For execution analysis and replication, an AODV, NS-2 organised test network is used. To prevent black hole, wormhole, malevolent, and flooding attacks, a countermeasure is employed that calculates the Trust value based on the route request, route response, and information packet. Following the count, place stock in values ranging from 0 to 1. If the trust esteem is more than 0.5, the node is solid and permits access to the network as a whole. The suggested convention, secure Ad hoc On-demand Distance Vector (SAODV), is evaluated in terms of network performance. When compared to the standard AODV convention, the results reveal a notable difference in execution. By increasing the duration of a dip in throughput, SAODV achieves a throughput superior to that of the joint malicious assault AODV and the current protocol. SAODV's packet delivery ratio is superior to that of the joint malicious attack AODV and the established AODV protocol. SAODV's end-to-end delay is superior to the joint malicious attack AODV and the current AODV protocol.

Downloads

Download data is not yet available.

Article Details

Section

Articles

Author Biography

Imran Khan, Scholar, Department of Computer Science Engineering, IES IPS Academy, Indore (M.P.), India.



How to Cite

Detecting and Predicting Malicious Nodes in Mobile Ad-Hoc Networks using a Secure Technique (Imran Khan & Pratik Gite , Trans.). (2025). International Journal of Emerging Science and Engineering (IJESE), 13(9), 15-19. https://doi.org/10.35940/ijese.D2526.13090825
Share |

References

I. Mohd Zaki and H. Rosilah, “The implementation of Internet of Things using test bed in the UK Mnet environment,” Asia Pacific Journal of Information Technology and Multimedia, vol. 8, no. 2, pp. 1–17, 2019. DOI: http://dx.doi.org/10.17576/apjitm-2019-0802-01

K. L. Arega, G. Raga, and R. Bareto, “Survey on performance analysis of AODV, DSR and DSDV in MANET,” Computer Engineering and Intelligent Systems, vol. 11, no. 3, pp. 23–32, 2020. DOI: http://doi.org/10.14445/22315381/IJETT-V69I8P225

T. Salam and M. S. Hossen, “Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network,” Wireless Personal Communications, vol. 113, no. 1, pp. 189–222, 2020. DOI: https://doi.org/10.1007/s11277-020-07185-6

M. S. Hossen, “DTN routing protocols on two distinct geographical regions in an opportunistic network: an analysis,” Wireless Personal Communications, vol. 108, no. 2, pp. 839– 851, 2019. DOI: https://doi.org/10.1007/s11277-019-06431-w

N. Khanna and M. Sachdeva, ‘‘BEST: Battery, efficiency and stability based trust mechanism using enhanced AODV for mitigation of blackhole attack and its variants in MANETs,’’ Adhoc Sensor Wireless Netw., vol. 46, nos. 3–4, pp. 215–264, 2020. https://dl.acm.org/toc/ijirr-igi/2022/12/3

R. Fotohi, E. Nazemi, and F. S. Aliee, ‘‘An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks,’’ Veh. Commun., vol. 26, Dec. 2020, Art. no. 100267. DOI: https://doi.org/10.1016/j.vehcom.2020.100267

A. Nabou, M. D. Laanaoui, and M. Ouzzif, ‘‘New MPR computation for securing OLSR routing protocol against single malicious attack,’’ Wireless Pers. Commun., vol. 115, pp. 1–20, Nov. 2020. DOI: https://doi.org/10.1007/s11277-020-07881-3

N. C. Singh and A. Sharma, ‘‘Resilience of mobile ad hoc networks to security attacks and optimization of routing process,’’ Mater. Today, Proc., 2020. DOI: https://doi.org/10.5120/ijca2022921988

M. Faraji-Biregani and R. Fotohi, ‘‘Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles,’’ J. Supercomput., vol. 76, pp. 1–28, Nov. 2020. DOI: https://doi.org/10.1007/s11227-020-03462-0

H. M. Haglan, S. A. Mostafa, N. Z. M. Safar et al., “Analyzing the impact of the number of nodes on the performance of the routing protocols in MANET environment,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 1, pp. 434–440, 2020.

DOI: https://doi.org/10.1007/978-981-16-1866-6_23

R.-R. Yin, N. Zhao, and Y.-H. Xu, ‘‘A selective forwarding attack considered routing protocol for scale-free network,’’ in Proc. 12th Int. Symp. Commun. Syst., Netw. Digit. Signal Process. (CSNDSP), Jul. 2020, pp. 1–6. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9336623

Most read articles by the same author(s)

<< < 4 5 6 7 8 9 10 > >>