Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Intelligent Route Discovery Towards Rushing Attacks in Ad Hoc Wireless Networks

View through CrossRef
Abstract MANET (Mobile Ad-hoc Networks) are distributed or delegated away from a central server, authoritative location of wireless networks that communicate without pre-existing structure. Ad-hoc networks are compromising the many types of attacks and routing. In MANET, the routing plays a vital role in terms of packets interaction and data transmission. Due to decentralized control, the MANET data transmission becomes insecure because of dispersed routing on the mobile ad-hoc nodes. Since the efficient route on MANET only controls the packets and does not simplify the route between the source to the destination, the maintenance of route interaction becomes a crucial process. Maintain effective data transactions over the MANET network, and it is essential to improve the route and locate the attacker. Nevertheless, MANET allows for route interaction against security threads. In this research article, four processing schemes are suggested to preserve the security measures against routing protocols. Especially in node communication, the rushing attacker has a significant impact on packet-based data transmission in MANET. Also, for this research, an Attacker detection automation of the Bees Colony Optimization (ADABCP) method is used, as a result of which the desired result is brought about in the effective attacker detection on the routing process. Moreover, the proposed Hybrid Random Late Detection (HRLD) routing protocol manages the MANET routing and overcomes the MANET congestion communication. The Swift Implicit Response Round Trip Time (SIRT) mechanism is generated by the Route Finding Manipulation (RFM) to enhance the performance. This RFM scheme helps to find the optimal routing in a secured manner. The proposed (SIRT-ADABCP-HRLD) approach was compared to the existing ESCT, ZRDM-LFPM, and ENM-LAC approaches, found to have improved by routing and data transmission. Compared to the conventional method, the method mentioned above achieves a better ratio for the end-to-end delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption.
Springer Science and Business Media LLC
Title: Intelligent Route Discovery Towards Rushing Attacks in Ad Hoc Wireless Networks
Description:
Abstract MANET (Mobile Ad-hoc Networks) are distributed or delegated away from a central server, authoritative location of wireless networks that communicate without pre-existing structure.
Ad-hoc networks are compromising the many types of attacks and routing.
In MANET, the routing plays a vital role in terms of packets interaction and data transmission.
Due to decentralized control, the MANET data transmission becomes insecure because of dispersed routing on the mobile ad-hoc nodes.
Since the efficient route on MANET only controls the packets and does not simplify the route between the source to the destination, the maintenance of route interaction becomes a crucial process.
Maintain effective data transactions over the MANET network, and it is essential to improve the route and locate the attacker.
Nevertheless, MANET allows for route interaction against security threads.
In this research article, four processing schemes are suggested to preserve the security measures against routing protocols.
Especially in node communication, the rushing attacker has a significant impact on packet-based data transmission in MANET.
Also, for this research, an Attacker detection automation of the Bees Colony Optimization (ADABCP) method is used, as a result of which the desired result is brought about in the effective attacker detection on the routing process.
Moreover, the proposed Hybrid Random Late Detection (HRLD) routing protocol manages the MANET routing and overcomes the MANET congestion communication.
The Swift Implicit Response Round Trip Time (SIRT) mechanism is generated by the Route Finding Manipulation (RFM) to enhance the performance.
This RFM scheme helps to find the optimal routing in a secured manner.
The proposed (SIRT-ADABCP-HRLD) approach was compared to the existing ESCT, ZRDM-LFPM, and ENM-LAC approaches, found to have improved by routing and data transmission.
Compared to the conventional method, the method mentioned above achieves a better ratio for the end-to-end delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption.

Related Results

ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Early Rushing Attack Detection and Prevention in AODV MANETs
Early Rushing Attack Detection and Prevention in AODV MANETs
Abstract In Mobile Ad hoc Network (MANET), data and route security are the primary concerns. One of the major techniques used to ensure data and route security is an intrus...
A Novel Algorithm for Early Detection and Prevention of Rushing Attack in AODV MANETs
A Novel Algorithm for Early Detection and Prevention of Rushing Attack in AODV MANETs
Abstract Mobile Ad hoc Network (MANET) attacks can be classified into active and passive attacks. Among active attacks, the rushing attack is one of the basic netwo...
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
XÂY DỰNG VÀ SỬ DỤNG HỌC LIỆU SỐ TRONG DẠY HỌC “SINH HỌC VI SINH VẬT VÀ VIRUS” (SINH HỌC 10)
Bài viết đề cập đến những nghiên cứu về tầm quan trọng của học liệu số, các dạng học liệu số trong dạy học Sinh học nói chung và dạy học Sinh học vi sinh vật và virus – Sinh học 10...
Chuyên san Dạy và Học - số 40 - Học cách học
Chuyên san Dạy và Học - số 40 - Học cách học
Quý độc giả thân mến,Sự phát triển bùng nổ của Internet mang tới cho chúng ta nhiều cơ hội học tập hơn bao giờ hết. Khi kiến thức không còn khan hiếm, cá nhân lại gặp phải một trở ...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
Chuyên san Dạy và Học - Số 27 - Khởi đầu
Chuyên san Dạy và Học - Số 27 - Khởi đầu
Vạn vật trong tự nhiên vẫn luôn vận hành theo một vòng quay, như mặt trời phải lặn và mặt trăng phải mọc, như mùa hạ đi để mùa thu tới, như chiếc hạt rơi cho một sự sống sắp nảy ch...
Sách chuyên khảo Tránh và Khắc phục sai sót trong việc thực hiện luận văn Thạc sĩ Kinh doanh và Quản lý tại Việt Nam
Sách chuyên khảo Tránh và Khắc phục sai sót trong việc thực hiện luận văn Thạc sĩ Kinh doanh và Quản lý tại Việt Nam
LỜI NÓI ĐẦUTheo đuổi bậc học Thạc sĩ ngày nay không còn là ước mơ quá xa vời đối với thế hệ trí thức trẻ Việt Nam hiện nay, đặc biệt là các bạn hoạt động trong lãnh vực Kinh doanh ...

Back to Top