A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t cooperate with other nodes and disturb the network through false routing information. In this paper, we propose a prominent technique, called dual attack detection for black and gray hole attacks (DDBG), for MANETs. The proposed DDBG technique selects the intrusion detection system (IDS) node using the connected dominating set (CDS) technique with two additional features; the energy and its nonexistence in the blacklist are also checked before putting the nodes into the IDS set. The CDS is an effective, distinguished, and localized approach for detecting nearly-connected dominating sets of nodes in a small range in mobile ad hoc networks. The selected IDS nodes broadcast a kind of status packet within a size of the dominating set for retrieving the complete behavioral information from their nodes. Later, IDS nodes use our DDBG technique to analyze the collected behavioral information to detect the malicious nodes and add them to the blacklist if the behavior of the node is suspicious. Our experimental results show that the quality of the service parameters of the proposed technique outperforms the existing routing schemes.
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
In a typical 10G-Passive Optical Network (XG-PON), the propagation delay between the Optical Network Unit (ONU) and Optical Line Terminal (OLT) is about 0.3 ms. With a frame size of 125 μs, this amounts to three frames of data in the upstream and three frames of data in the downstream. Assuming no processing delays, the grants for any bandwidth requests reach the ONU after six frames in this request-grant cycle. Often, during this six-frame delay, the queue situation is changed drastically, as much, more data would arrive in the queue. As a result, the queued data that is delayed loses its significance due to its real-time nature. Unfortunately, almost all dynamic bandwidth allocation (DBA) algorithms follow this request-grant cycle and hence lacking in their performance. This paper introduces a novel approach for bandwidth allocation, called Demand Forecasting DBA (DF-DBA), which predicts ONU’s future demands by statistical modelling of the demand patterns and tends to fulfil the predicted demands just in time, which results in reduced delay. Simulation results indicate that the proposed technique out-performs previous DBAs, such as GigaPON access network (GIANT) and round robin (RR) employing the request-grant cycle in terms of Throughput and Packet delivery ratio (PDR). Circular buffers are introduced in statistical predictions, which produce the least delay for this novel DF-DBA. This paper, hence, opens up a new horizon of research in which researchers may come up with better statistical models to brew better and better results for Passive optical networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.