Energy and security are the two vital components of Mobile Ad-hoc Networks (MANETs). During routing finding an optimal path from sender to receiver sense of path length (number of hops), longevity (battery life) and security becomes an essential requirement. Variety of schemes are proposed by the researchers for finding the shortest path along with energy saving and protecting from attacks Black-hole and gray-hole attacks are some of the most harmful attacks against MANET communication and needs attention. These attacks may cause by insider or outsider malicious node(s) who may drop packets or misroute the information during communication from sender node to receiver node. In our study we proposed an intelligent routing protocol based on Ant Colony Optimization (ACO) technique that finds shortest path from source to destination, applies the concept of power aware techniques to save energy increasing the longevity of the link avoiding link failure and also uses the concept of digital signatures, watchdog and path rater for detection and avoidance ofblackhole and gray-hole attacks. Simulation study of the proposed scheme is made over some network parameters and found to be efficient in comparison to the basic AODV routing protocol.
Mobile Ad-hoc networks (MANETs) can be termed as an autonomous system created by the collaboration of a set of motile nodes communicating with one another through available wireless media and each node behaves as an end system, as well as a router for packet forwarding. Each node is allowed to move freely, change locations and configure them to form a network. Finding an optimal and efficient path between the sender and receiver node is the main aim of routing protocols. Multipath routing protocols show a better result in comparison to single path routing protocols, for data transmission from source to destination extending lifetime of the network. Along with that security in routing for a protected communication between nodes has become a prime concern as any attack during routing may interrupt data transmission, paralyzing the whole network. During packet transmission through multiple paths a number of attacks make come into action by the unauthenticated and compromised nodes present within the network and black-hole attack is one of them. So our objective is to design a multipath routing protocol that detects and avoids the path containing black-hole. Our paper proposes a way to defense the black-hole and gray-hole attacks with the help of intelligence in MANET.
<p class="western" style="margin-top: 0.21cm; margin-bottom: 0cm; line-height: 100%;" lang="en-US" align="justify"><span>Mo</span><strong><span>b</span></strong><span>ile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further to the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.</span></p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.