Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET

04/21/2023
by   S. M. Udhaya Sankar, et al.
0

Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unauthorized access. Although the current solutions have been designed to defeat the attack nodes, they still require additional hardware, have considerable delivery delays, do not offer high throughput or packet delivery ratios, or do not do so without using more energy. The capability of a mobile node to forward packets, which is dependent on the platform's life quality, may be impacted by the absence of the network node power source. We developed the Safe Routing Approach (SRA), which uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process. The attacking node recognition system is made for irregular routing node detection to protect the controller network's usual properties from becoming recognized as an attack node. The suggested method examines the nearby attack nodes and conceals the trusted node in the routing pathway. The path is instantly assigned after the initial discovery of trust nodes based on each node's strength value. It extends the network's life span and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy consumption, network performance, and detection of attack nodes, the suggested approach is contrasted with AIS, ZIDS, and Improved AODV. The findings demonstrate that the recommended strategy performs superior in terms of PDR, residual energy, and network throughput.

READ FULL TEXT

page 6

page 9

page 10

research
02/24/2020

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed ...
research
12/28/2017

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...
research
12/23/2019

A Replication Strategy for Mobile Opportunistic Networks based on Utility Clustering

Dynamic replication is a wide-spread multi-copy routing approach for eff...
research
02/24/2020

A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network

Vehicular Ad-Hoc Networks (VANET) are a proper subset of mobile wireless...
research
02/24/2023

CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis

The IPv6 routing protocol for low-power and lossy networks (RPL) is the ...
research
06/02/2020

Trust-Based Winnow Linear Multiplicative Classification For Secure Multipath Routing In Manet

Multipath routing in Mobile Ad Hoc Network (MANET) plays a significant c...
research
03/26/2020

Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks

Software-defined networking (SDN) is a promising technology to overcome ...

Please sign up or login with your details

Forgot password? Click here to reset