Network Security Attacks for Wireless Mobile Ad Hoc Networks using Hybrid Routing Protocol

Thamizhmaran K.*
Department of Electronics Communication Engineering, Government College of Engineering, Theni, Tamilnadu, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jmt.10.2.20430

Abstract

Mobile Ad Hoc Networks (MANETs) are decentralized networks where mobile nodes communicate through radio waves without fixed infrastructure. However, they are susceptible to security attacks like the black hole attack, where malicious nodes claim optimal routes to intercept packets. This paper focuses on detecting black hole attacks within MANETs using a hybrid routing protocol. Specifically, the Modified-Zone-Based Hierarchical Link State (M-ZHLS) routing protocol is proposed and evaluated against existing protocols using simulations in NS2. The proposed method employs on-demand topology information transmission and utilizes techniques like expanding ring flooding for route discovery. Simulation results demonstrate that M-ZHLS outperforms existing protocols by reducing average delay by 5%, lowering routing overhead by 4%, and increasing delivery ratio by 4.5%. Future work aims to further enhance network performance in real-time environments.

Keywords

MANET, Black Hole Attack, M-ZHLS, PDR, Network Simulations 2, Overhead, Throughput, Mobility Speed, Topology Size.

How to Cite this Article?

Thamizhmaran, K. (2023). Network Security Attacks for Wireless Mobile Ad Hoc Networks using Hybrid Routing Protocol. i-manager’s Journal on Mobile Applications & Technologies, 10(2), 24-30. https://doi.org/10.26634/jmt.10.2.20430

References

[4]. Dey, R., & Saha, H. N. (2016). Secure routing protocols for mobile ad-hoc network (MANETs)–a review. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 5(1), 74-79.
[5]. Gupta, A. K., Sadawarti, H., & Verma, A. K. (2011). A review of routing protocols for mobile ad hoc networks. WSEAS Transactions on Communications, 10(11), 331-340.
[6]. Kalime, S., & Sagar, K. (2021). A review: Secure routing protocols for mobile adhoc networks (MANETs). Journal of Critical Reviews, 7(19), 8385-8393.
[10]. Prabu, K., & Subramani, A., (2012). Performance comparison of routing protocol in MANET. International Journal of Computer Science and Software Engineering, 2(9), 388–392.
[13]. Thamizhmaran, K. (2012a). Secure routing protocol in MANET–A Survey. International Journal of Advance Research in Technologs, 3(3), 9-14.
[14]. Thamizhmaran, K. (2012b). Authentication and intrusion detection in MANET. International Journal of Advance Research in Technology, 3(3), 15-21.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.