Filters








248 Hits in 7.6 sec

An energy efficient multipath routing protocol for MANET

Dr.B.T. Krishna, Head of the Department of ECE, JNTU Kakinada, Andhra Pradesh, India., Neenavath Veeraiah, Department of ECE, JNTU Kakinada, Andhra Pradesh, India.
2022 Maǧallaẗ al-abḥāṯ al-handasiyyaẗ  
Energy consumption is a critical consideration in mobile ad hoc networks because the majority of mobile nodes run on low battery resources.  ...  The energy efficiency within the MANET is efficiently achieved by the use of cluster head selection with fuzzy clustering and fuzz NB.  ...  INTRODUCTION Nodes in a Mobile Ad Hoc Network (MANET) may freely move across the network without the need for any central infrastructure.  ... 
doi:10.36909/jer.13771 fatcat:w62gbbzsqzfzhmrp7bwvquf5ym

An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks

C.A. Gokula Krishnan, Dr.A. Suphalakshmi
2017 Bonfring International Journal of Research in Communication Engineering  
As in ad-hoc network communication intermediate in network medium is air so it would be easy for invader to fetch information from air intermediate using sniffing simulation software tool.  ...  In this paper, we realized to in tentds the Sybil Attack Detection Based on MAC address classification technique which is used to detect the Sybil nodes in the network and also prevent it.  ...  The proposed intrusion detection system for mobile adhoc network has been implemented and tested for its efficiency.  ... 
doi:10.9756/bijrce.8315 fatcat:2nmjwr6nsvgbrdh24dk2kneuqe

Review and Analysis of the Security Issues in MANET

Preeti Gulia, Sumita Sihag
2013 International Journal of Computer Applications  
Mobile Ad-hoc Networks (MANETs) are one of the fastest emerging networks. MANET is a unstructured network in which nodes are mobile. This mobility may leads to insecurity in MANET.  ...  BFOA (Bacterial foraging optimization algorithm) is a Bio-inspired Algorithm. This algorithm simulates behavior of bacteria that can be effectively applied in various fields.  ...  For improving security, Enhanced Intrusion Detection System for discovering affected or attacker nodes in Mobile Ad Hoc Networks: The main feature of this system is its ability to discover malicious nodes  ... 
doi:10.5120/13131-0498 fatcat:tcnqqpe2nnamnpyyxe2coukhdy

Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET

Pradeep Kumar Krishnappa, B R Prasad Babu
2015 International Journal of Electrical and Computer Engineering (IJECE)  
<span>The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues.  ...  Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively.  ...  INTRODUCTION In Mobile Ad hoc Networks (MANET) [1] , nodes are self-organized and use wireless links for communication between themselves.  ... 
doi:10.11591/ijece.v5i5.pp1194-1201 fatcat:hwn5w6bv5jehhjezuduiynmjzm

AN ACCURATE IDENTIFICATION OF PACKET DROPPING ATTACKS USING CAT SWARM OPTIMIZATION (CSO) TO ENSURE BETTER INTRUSION DETECTION IN MANET ENVIRONMENT

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
For mobile ad hoc networks, swarm optimization approach based novel intrusion detection system is proposed in this paper.  ...  The proposed system is based on Cat swarm optimization (CSO) for detecting, one of vey possible attack, i.e. packet dropping attack in mobile ad hoc networks.  ...  V.CONCLUSION In mobile ad hoc networks, for packet dropping attack, binary formed novel swarm optimization based on intrusion detection system is propose in this work.  ... 
doi:10.35940/ijitee.a4813.1091220 fatcat:iqknefqfufc5rjdfarxlwx7t7i

Trust aware secure energy efficient hybrid Protocol for MANET

Neenavath Veeraiah, Osamah Ibrahim Khalaf, C.V.P.R. Prasad, Youseef Alotaibi, Abdulmajeed Alsufyani, Saleh Alghamdi, Nawal Alsufyani
2021 IEEE Access  
Srivatsa [15] Multipath routing is a commonly employed method in the Mobile Ad Hoc Networks for utilizing many alternate routes (MANETs).  ...  INTRODUCTION Mobile Ad hoc Network (MANET) [1] includes nodes equipped using a radio broadcaster along with also a receiver which works from the system via bidirectional wireless connectivity.  ...  IOS mobile development, Cloud system and computations, website design.  ... 
doi:10.1109/access.2021.3108807 fatcat:vnpna2pdjvdgxduis6ll4ejmku

Secured Routing in Mobile Ad hoc Networks (MANETs)

S. Maharaja, R. Jeyalakshmi, A.V. Sabarish Kanna, M. Deva Priya
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance.  ...  In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp.  ...  In Mobile Ad Hoc Network (MANET), the mobile nodes act as routers, thus forming a backbone of the dynamic network and extending the range of ad hoc WLAN [5].  ... 
doi:10.32628/cseit195275 fatcat:24jkoix77rgdhbeckkon3x4txi

SINKHOLE ATTACK DETECTION IN MANET USING SWARM INTELLIGENCE TECHNIQUES

Laxmi ., Dr. Rashmi Popli
2020 International Journal of Engineering Applied Sciences and Technology  
In a mobile ad-hoc network (MANET), there is a short-lived network setup by unbounded nodes, which move anywhere and communicate within the absence of centralized network.  ...  Mobile Adhoc Network (MANET) is multi-hop remote system of self-governing versatile nodes with no preset framework where each node can move toward any path to play a task of router.  ...  INTRODUCTION Mobile Adhoc Network (MANET) is a self-organizing system of movable mobile nodes joint by wireless connection without any entrance point.  ... 
doi:10.33564/ijeast.2020.v05i04.021 fatcat:pgowo4olnbb4hn75msuvwfspde

Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

G. Indirani, K. Selvakumar
2012 International Journal of Computer Applications Technology and Research  
In this paper, a swarm based detection and defense technique is proposed for routing and MAC layer attacks in MANET.  ...  The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.  ...  John Felix Charles Joseph et al [14] has proposed a cross-layer based routing attack detection system for ad hoc networks.  ... 
doi:10.7753/ijcatr0201.1009 fatcat:geueh6mw6bfp3prrankm3bb2jm

An optimal Security Mechanism to Preventmulti-threat in MANET using Bee Algorithm

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The special characteristics of the Mobile and Ad hoc network (MANET) attract the users to access the services provided by the network.  ...  The prevention structure has been modeled using swarm and machine intelligence.  ...  INTRODUCTION Mobile Ad-hoc Networks (MANETs) is known for its mobility and ad-hoc architecture.  ... 
doi:10.35940/ijitee.k2145.0981119 fatcat:x25fxv2hsvgcdjn2hvqsxl4jdm

Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs

Shabana Mehfuz, M. N. Doja
2008 Journal of Artificial Evolution and Applications  
In this paper, we have proposed a new secure power-aware ant routing algorithm (SPA-ARA) for mobile ad hoc networks that is inspired from ant colony optimization (ACO) algorithms which are a swarm intelligent  ...  Characteristics of mobile ad hoc networks (MANETs) such as lack of central coordination, mobility of hosts, and limited availability of resources make quality of service (QoS) provisioning very challenging  ...  Multiple sensors intrusion detection system for ad hoc wireless networks based on mobile agent technology has been proposed in [41] .  ... 
doi:10.1155/2008/236803 fatcat:ld4wz4lvobe25ex6jv4mf5if4y

An Optimized Fuzzy Based Ant Colony Algorithm for 5G-MANET

R. Nithya, K. Amudha, A. Syed Musthafa, Dilip Kumar Sharma, Edwin Hernan Ramirez-Asis, Priya Velayutham, V. Subramaniyaswamy, Sudhakar Sengan
2022 Computers Materials & Continua  
Optimized Fuzzy based ACO Algorithm for 5G.  ...  For this reason, routing protocols of MANET have the possibility of being fundamentally flexible, high performance, and energy-efficient.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.019221 fatcat:jwxdlivdyndcpocfvjgqh5arki

ENERGY EFFICIENT AND AUTHENTICATED ROUTING IN MANET FOR EMERGENCY RESCUE OPERATIONS

J Nandhini
2020 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
The security aspects are to be considered for an efficient routing. The main challenge and research area in MANET is a route path identification, intrusion detection and energy consumption.  ...  It also controls or manages the adding and removing of devices to and from the network. With nodal mobility, network topology changes randomly over time.  ...  ElhadiShakshuki Nan Jang &TarekSheltami (2013) proposed Enhanced Adaptive ACKnowledgment (EAACK) with a secure intrusion detection system for MANETs.  ... 
doi:10.26782/jmcms.spl.7/2020.02.00008 fatcat:sbksekaxsvbejlufza4glh2sf4

Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET

G. Usha, K. Mahalakshmi
2016 International Journal of Modern Education and Computer Science  
Selvakumar, "A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (  ...  Due to dynamic network topology MANET security is a challenging task. Most of the routing protocols in MANET assumes a cooperative environment for communication.  ...  In this paper we propose a new architecture for MANET intrusion detection system called the mobile adhoc cross layer intrusion detection (MACLIDS) .This cross layer based intrusion detection system is  ... 
doi:10.5815/ijmecs.2016.07.07 fatcat:xfzqzlr7vnahlfc3pbzu4mr6pm

Bi-Fitness Swarm Optimizer: Blockchain Assisted Secure Swarm Intelligence Routing Protocol for MANET

Haridas .S, Dr.A. Rama Prasath
2021 Indian Journal of Computer Science and Engineering  
Mobile Ad Hoc Networks is a communication network between devices without infrastructure and random mobility of device and hence proper management of nodes and security provisioning is a vital task and  ...  Secure Priority based Routing is presented by Particle Swarm Optimization (PSO) method. In this step, bi-fitness optimizer is used.  ...  Introduction Mobile Ad Hoc Network (MANET) is a specific kind of ad hoc network that does not has any central entity to control communication.  ... 
doi:10.21817/indjcse/2021/v12i5/211205158 fatcat:sao647dpyfhkzkqkjjd7orlmbq
« Previous Showing results 1 — 15 out of 248 results