Acknowledgement based Topology Control using Hybrid Cryptography for MANETS

Thamizhmaran K.*
Department of ECE, Government College of Engineering, Bodinayakkanur, Theni, Tamilnadu, India.
Periodicity:March - May'2020
DOI : https://doi.org/10.26634/jit.9.2.17852

Abstract

Mobile Ad hoc Network (MANET) is the significant technology among various wireless communication technologies where all the nodes are mobile and which can be connected to dynamically used wireless link in a random manner. They connect or disconnect from the active network any time and transfer packets in a single or a multicast mode. Nodes are connected by way of wireless links and form a random topology. This research paper focuses on, performance comparison of a new Intrusion Detection Systems (IDS), Secure-Enhanced Adaptive 3 Acknowledgement with hybrid cryptography's EA3ACK-MARS4 and EA3ACK-ECC specially designed for MANET. Furthermore, all the above mentioned protocols are compared based on several important performance metrics which are Packet Delivery Ratio (PDR), end-toend delay and average energy via one of the efficient networking routing protocol called Network Simulator 2 (Ns2). It is used to implement and test the suggested system under various size of topology with different constant sets of nodes as well as comparing the results with two different protocols.

Keywords

EAACK, MARS4, ECC, PDR, Delay, Energy.

How to Cite this Article?

Thamizhmaran, K. (2020). Acknowledgement based Topology Control using Hybrid Cryptography for MANETS. i-manager's Journal on Information Technology, 9(2), 36-44. https://doi.org/10.26634/jit.9.2.17852

References

[1]. Basabaa, A., Sheltami, T., & Shakshuki, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Computer Science, 32, 571-578.
[2]. Choi, J., Cha, S. H., Park, G., & Song, J. (2005). Malicious nodes detection in AODV-based mobile ad hoc networks. GESTS International Transactions on Computer Science and Engineering, 18(1), 49-55.
[3]. Johnson, D., Maltz, D., Hu, Y., & Jetcheva, J. (2002). The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks [Internet Draft]. IETF MANET Working Group. Retrieved from https://tools.ietf.org/html/draft-ietf-manetdsr- 07
[4]. Li, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security,13(2), 109-120.
[5]. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536-550.
[6]. Mathew, S., & Jacob, K. P. (2006, September). A novel fast hybrid cryptographic system: MARS4. In 2006 Annual IEEE India Conference (pp. 1-5). IEEE.
[7]. Perkins, C. E., & Belding-Royer, E. (2001). Quality of Service in Ad-hoc on-demand Distance Vector Routing [Internet Draft]. IETF MANET Working Group. Retrieved from https://tools.ietf.org/html/draft-perkins-manet-aodvqos-00
[8]. Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.
[9]. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK: A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089- 1098.
[10]. Thamizhmaran, K. (2012). Secure routing protocol in MANET: A survey. International Journal of Advance Research in Technology, 3(3), 9-14.
[11]. Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. International Journal of Computer Science Issues, 7(4).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.