HIASA: Hybrid Improved Artificial Bee Colony and Simulated Annealing based Attack Detection Algorithm in Mobile Ad-hoc Networks (MANETs)
Journal Title: Bonfring International Journal of Industrial Engineering and Management Science - Year 2017, Vol 7, Issue 2
Abstract
A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less network of mobile devices in which every device is wireless, be in motion devoid of constraint and be a router to get across traffic unrelated to its individual use. Each device ought to be organized to persistently maintain the information, mandatory for routing the traffic. Furthermore this is the major confront in constructing a MANET. As of a security design viewpoint, MANETs contain no apparent line of defense; that is to say no integral security. Therefore, the wireless channel is available to both legal network users and malevolent invaders. Consequently the `attack investigation is a difficult issue, particularly in MANET where there are only some well-known attacks. Presently, numerous competent routing protocols have been presented for MANET. The majority of these protocols presume a trusted and supportive environment. On the other hand, in the subsistence of malevolent nodes, the networks are susceptible to various types of attacks. In this work a new Hybrid Improved Artificial bee colony and Simulated annealing (HIASA) based attack identification algorithm is proposed to examine various kinds of attacks. The presented HIASA based Attack Detection (HIASA-AD) utilize Artificial Bee Colony (ABC) and Simulated Annealing (SA) algorithm to resolve various types of attacks for instance sybil attacks, wormhole attacks, routing attacks. Fundamental behavior of the nodes, attacks was identified amid source to destination all through Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols. An attack could be decomposed into some mixtures of fundamental events. Afterward define taxonomy of anomalous basic events by examining the fundamental security objectives. AODV and DSR routing protocols are examined in relation to throughput, Packet Delivery Ratio (PDR), and End to End (E2E) Delay. The functioning of AODV is superior to DSR in relation to PDR, throughput, and E2E delay. As the DSR is a reactive routing protocol, it is containing a smaller amount end to end delay as contrast to AODV. These AODV and DSR routing protocols are simulated by Network Simulator-2(NS2) to authorize HIASA-AD algorithm.
Authors and Affiliations
Siva Prasad P. V. S, Dr. Krishna Mohan Rao S
Patterns of Phulkari:Then and now
This study explores the patterns of embroidered textile craft of Punjab. Being embroidered by women in their leisure time, it is an important part of Punjabi culture. Phulkari has been so densely interwoven in the lives...
Growing Role of Bancassurance in Banking Sector
The growing global insurance industry has brought new channels of distribution into existence, leading to a new concept called Bancassurance. Nowadays banks have started increasing their business to securities and insura...
A Comparative Study on Removal of Toluene by Batch Reactor using Different Fungal Culture Isolated from Municipal Sewage Water
The increasing rate of polluted gases in the atmosphere raises some of the major environmental and human health related problems that was recently suspected; hence the comparative study on removal of toluene by batch rea...
Impact of Mobile Shopping Behaviour: Implications for Designing Mobile Marketing Strategy
Mobile commerce, by the end of 2017, will be 24.4% of overall Ecommerce revenues. Mobile app stores have emerged as vital part of Mcommerce. It is projected to grow to $76.5 billion in 2017 according to a survey from Sta...
Exchange Rate Risk in the Foreign Exchange Market: A Challenge on Corporate Profitability
Foreign exchange market is the largest traded market across the globe. In India, foreign exchange market opened for trade during the decade of 1970's and most of the transaction done through banks. Many companies in Indi...