HIASA: Hybrid Improved Artificial Bee Colony and Simulated Annealing based Attack Detection Algorithm in Mobile Ad-hoc Networks (MANETs)
Journal Title: Bonfring International Journal of Industrial Engineering and Management Science - Year 2017, Vol 7, Issue 2
Abstract
A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less network of mobile devices in which every device is wireless, be in motion devoid of constraint and be a router to get across traffic unrelated to its individual use. Each device ought to be organized to persistently maintain the information, mandatory for routing the traffic. Furthermore this is the major confront in constructing a MANET. As of a security design viewpoint, MANETs contain no apparent line of defense; that is to say no integral security. Therefore, the wireless channel is available to both legal network users and malevolent invaders. Consequently the `attack investigation is a difficult issue, particularly in MANET where there are only some well-known attacks. Presently, numerous competent routing protocols have been presented for MANET. The majority of these protocols presume a trusted and supportive environment. On the other hand, in the subsistence of malevolent nodes, the networks are susceptible to various types of attacks. In this work a new Hybrid Improved Artificial bee colony and Simulated annealing (HIASA) based attack identification algorithm is proposed to examine various kinds of attacks. The presented HIASA based Attack Detection (HIASA-AD) utilize Artificial Bee Colony (ABC) and Simulated Annealing (SA) algorithm to resolve various types of attacks for instance sybil attacks, wormhole attacks, routing attacks. Fundamental behavior of the nodes, attacks was identified amid source to destination all through Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols. An attack could be decomposed into some mixtures of fundamental events. Afterward define taxonomy of anomalous basic events by examining the fundamental security objectives. AODV and DSR routing protocols are examined in relation to throughput, Packet Delivery Ratio (PDR), and End to End (E2E) Delay. The functioning of AODV is superior to DSR in relation to PDR, throughput, and E2E delay. As the DSR is a reactive routing protocol, it is containing a smaller amount end to end delay as contrast to AODV. These AODV and DSR routing protocols are simulated by Network Simulator-2(NS2) to authorize HIASA-AD algorithm.
Authors and Affiliations
Siva Prasad P. V. S, Dr. Krishna Mohan Rao S
Adsorptive Removal of Metal (Cu++, Co++ and NI++) Ions from Aqueou Solution Over Powdered Activated Carbon: A Kinetic and Equilibrium Study
Water pollution is one of the most undesirable environmental problems in the world and it requires solutions. Textile industries produce a lot of wastewater, which contains a number of contaminants, including acidic or...
Microwave Drilling with Litz Wire using a Domestic Applicator
The work presented in the paper shows a way to drill a blind hole on perspex material at 2.45 GHz frequency of microwaves using a domestic applicator of 700 W maximum powers. The approach was based on the approach...
Effect of Fly Ash and SiC Particles on Hardness and Microstructure of Friction Stir Welded MMCs
Metal matrix composites (MMCs) constitute an important class of design and weight efficient structural materials that are encouraging every sphere of engineering applications. Since, there has been an increasing interest...
An Overview of Organizational Commitment among the IT Employees in Chennai City
The organizational Commitment in IT companies is a result oriented phenomena. The organizational Commitment is closely related to behvarioural perspectives of employees of IT companies. The right feelings and attitude pr...
An Overview of India Capital Markets
In India, the history of capital markets dates back to the 18th century when East India Company securities traded the country. The present study is largely based on the available secondary data. The statistical data rega...