Department of Computer Science (PG)

Permanent URI for this communityhttps://dspace.psgrkcw.com/handle/123456789/146

Browse

Search Results

Now showing 1 - 6 of 6
  • Item
    AN ENERGY COMPACTION USING OPTIMIZED DSR AND BRANCH AND BOUND ALGORITHM IN MANET
    (The Mattingley Publishing Co.Inc, 2020-04) Sasikala S; Ponmuthuramalingam P
    Mobile Ad-hoc Network (MANET) is used for wireless communication, in that mobile nodes forms a communication without infrastructure. In the wireless communication, Routing has been the most decisive area of research in ad hoc network. The prominent type of MANET protocol is DSR protocol. Dynamic Source Routing (DSR) is used for the effective route discovery. The DSR protocol is incorporated with Branch and Bound algorithm for the optimal route discovery. The proposed algorithm, Modify DSR with Modify Branch and Bound aims at increasing the energy utilizing level in Discover Routing, Packet forwardingand Collision avoidance. It helps to progress the efficiency of the energy level in MANET. One of the chief impact of this research work is to ensure Packet forwarding with efficient utilization of Energy attributes in MANET. Performance metrics like End to end Delay, Packet Delivery Ratio (PDR), Nodes Energy, Network Life time, Routing Overhead and Throughput has used for the evaluation of performance of the proposed algorithm.
  • Item
    SECURE AND ATTACK AWARE ROUTING IN MOBILE AD HOC NETWORKS AGAINST WORMHOLE AND SINKHOLE ATTACKS
    (by CONFYY in association with PPG institute of technology Coimbatore, 2017-10-19) D, Sasirekha; N, Radha
    The inherent characteristics of Mobile Ad hoc network (MANET) such as dynamic topology, limited bandwidth, limited power supply, infrastructure less network make themselves attractive for a wide spectrum of applications and vulnerable to security attacks. Sinkhole attack is the most disruptive routing layer attack. Sinkhole nodes attract all the traffic towards them to setup further active attacks such as Black hole, Gray hole and wormhole attacks. Sinkhole nodes need to be isolated from the MANET as early as possible. In this paper, an effective mechanism is proposed to prevent and detect sinkhole and wormhole attacks in MANET. The proposed work detects and punishes the attacker nodes using different techniques such as node collusion technique, which classifies a node as an attacker node only with the agreement with the neighboring nodes. When the node suspects the existence of attacker or sinkhole node in the path, it joins together with neighboring nodes to determine the sinkhole node. In the prevention of routing attacks, the proposed system introduces a route reserve method; new routes learnt are updated in the routing table of the node only after ensuring that the route does not contain the attacker nodes. The proposed system effectively modifies Ad hoc on demand Distance Vector (AODV) with the ability to detect and prevent the sinkhole and wormhole attack, so the modified protocol is named as Attack Aware Alert (A3AODV). The experiments are carried out in NS2 simulator, and the result shows the efficiency in terms of packet delivery ratio and routing overhead
  • Item
    SECURING DATA TRANSMISSION IN MANET USING AN IMPROVED COOPERATIVE BAIT DETECTION APPROACH
    (Bharathiar University, Coimbatore, 2016-10-24) Nachammai M; Radha N
    Mobile Ad hoc Network often called as MANET, which does not have any particular infrastructure, in which each mobile deviceis connected wirelessly and can move freely in any direction without having any restrictions in the network. Malicious nodes present in this network can easily launch highly vulnerable attacks like collaborative Black hole attack and Gray hole attack due to its dynamically changing topology. These attacks affect the routing process within MANET. Hence, Security is the primary concern for finding these nodes. But, to prevent or detect malicious nodes that causes Gray hole or a collaborative black hole attack is a challenge. In this scheme, the malicious nodes and its behaviors are detected using reverse tracing technique by sending RREQ and RREP. However, security for transmitting data is not considered by CBDS. In order to have secure transmission after the malicious node detection, our proposed system uses an improved Cooperative Bait Detection approach which incorporates CBDS with message security schemes. Finally, this approach is compared with the existing system by using performance metrics like End-to-End Delay, Packet Delivery Ratio (PDR), Throughput and Routing Overhead
  • Item
    A SURVEY ON WORMHOLE AND SINKHOLE ATTACK DETECTION AND PREVENTION TECHNIQUES IN MANET
    (International Journal of engineering research and application, 2017-11) Sasirekha D; Radha N
    Nowadays with the wide range of applications in wireless networks, there is an increasing need for security of these networks. Specifically, the Mobile Ad-hoc networks are very easy to vulnerable due to many security threats and attacks. These networks have been subjected to numerous attacks among which Sinkhole and wormhole attack are the prominent attacks. In the network routing these attacks should be identified earlier and recovered soon. In the wormhole attack, the data transferred to more routes or the malicious node abused the received data into many ways. In the Sinkhole attack the attacker seeks the data transferred by attracting the node in various ways. Various solutions are found to detect these network attacks. In this paper, a comparative analysis of those techniques is performed. This study finds the impact and suitable methods to prevent and detect wormhole and sinkhole attacks in Mobile ad-hoc networks.
  • Item
    AN IMPROVED TRUST BASED APPROACH FOR DETECTING MALICIOUS NODES IN MANET
    (International Journal of Computer Trends and Technology, 2016-11) Nachammai M; Radha N
    Mobile ad hoc network (MANET) is an infrastructure-less network of mobile devices connected wirelessly. MANET is used widely today because of its nature as self-configuring, easy to move independently in any directions. MANET acts like a router and therefore changes its links to other devices frequently. Due to its nature MANET has been used in various applications like Military applications, Wireless Sensor Network and so on. As its infrastructure-less and dynamic nature, it is highly affected by various attacks like black hole attack, gray hole attack, DoS attack and many collaborative attacks. Hence security is the main challenge in MANET. Many existing works has done on the basis of detecting attacks by using various approaches like Intrusion Detection, Bait detection, Cooperative malicious detection and so on. But this Trust based approach mainly focuses on detecting the malicious nodes on the trusted path than the shortest path as discovered by using DSR mechanism
  • Item
    SURVEY ON BLACK HOLE AND GRAY HOLE ATTACKS IN MANET
    (International Journal of Computer Sciences and Engineering, 2016-05) Nachammai M; Radha N
    Mobile Ad hoc Network (MANET) is one of the most promising technologies in the recent years. In MANET, a wireless network is quickly formed using mobile nodes. Because of its characteristics such as open and undefined medium, limited resources, offering a secure data transmission in presence of malicious nodes in the network is main issues of the MANET. The black hole and gray hole attacks are major security threats in MANET, in which the packets are dropped in intermediate nodes. The main objective of this paper is to study the techniques used to eliminate the packet drop in intermediate nodes using malicious node detection techniques. In this paper, various malicious node detection methods such as Local anomaly detection and Cooperative anomaly detection, Fuzzy and wavelet transform based IDS system, Modified DSR protocol , Kullback-Leibler divergence approach, FireCol , hash function based method and cooperative bait detection scheme (CBDS) are studied and analyzed. The findings of this work proved that the cooperative bait detection achieves better results than the other approaches in terms of packet delivery ratio and end-to-end delay.