Using Customized Active Resource Routing and Tenable Association using Licentious Method Algorithm for Secured Mobile Ad-Hoc Network Management

Using Customized Active Resource Routing and Tenable Association using Licentious Method Algorithm for Secured Mobile Ad-Hoc Network Management

V. Lakshman Narayana C.R.Bharathi 

Department of CSE, Veltech University, Avadi, Chennai, Tamil Nadu. Member, IAENG. Vignan’s Nirula Institute of Technology & Science for Women, Guntur, Andhra Pradesh

Department of ECE, Veltech University, Avadi, Chennai, Tamil Nadu

Corresponding Author Email: 
lakshmanv58@gmail.com, crbharathi@veltechuniv.edu.in
Page: 
270-282
|
DOI: 
https://doi.org/10.18280/ama_b.600117
Received: 
15 March 2017
| |
Accepted: 
15 April 2017
| | Citation

OPEN ACCESS

Abstract: 

 Security is a decisive requisite in Mobile Ad-Hoc Network (MANETs) when assessed to wired networks. MANETs are more suspicious to security attacks due to the need of a reliable centralized cloud and scanty resources. In MANET, We have malicious nodes that overcome the network protocols thereby diminishing the network’s performance. The development of mobile networks has implicated the need of new IDS models in order to deal with new security issues in these communication environments. In this paper, we proposed a Secured Network using Promiscuous Mode (SNuMP) which is a part of Intrusion Detection System where it can repair the malicious nodes and convert back them into a normal node for effective network performance.

Keywords: 

Index Term - MANET, Malicious node, Promiscuous mode, MDSR, SNuMP

1. Introduction
2. Related Works
3. Overview of DSR
4. Promiscuous Mode
5. Proposed Methodology
6. Performance Analysis
7. Conclusion
  References

[1] Y.A. Huang, W.K. Lee, A Cooperative Intrusion Detection System for Ad-hoc Networks, 2003, ACM Proceedings. 

[2] B. Sun et al., Intrusion detection techniques in mobile ad hoc and wireless sensor networks, 2007, IEEE Wireless Communications, vol. 14, no. 5, pp. 56-63. 

[3] G. Singh, G. Singh, Improvement of Network Efficiency by Preventing, 2014, IJITEE, ISSN: 2278-3075, vol. 4, no. 2. 

[4] D. Kaur, N. Kumar, Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV routing protocols in Mobile Ad-hoc Networks, 2013, I. J. Computer Network and Information Security, vol. 3, pp. 39-46 

[5] P. Nand, S.C. Sharma, Routing Load Analysis of Broadcast based Reactive Routing Protocols AODV, DSR and DYMO for MANET, 2011, International Journal of Grid and Distributed Computing. 

[6] S.A. Ade, P.A. Tijare, Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad-hoc Networks, 2010, International Journal of Information Technology and Knowledge Management July-December 2010, vol. 2, no. 2, pp. 545-548. 

[7] P. Johansson, T. Larsson, N. Hedman et al., Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks, 1999, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, ACM.

[8] S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating Routing Misbehavior in Mobile Ad-hoc Networks, 2000, Proceedings of 6th international conference on Mobile computing and networking, ACM. 

[9] M. Pushpalatha, R. Venkataraman, T. Ramarao, Trust Based Energy Aware Reliable Reactive Protocol in Mobile Ad-hoc Networks, 2009, World Academy of Science. 

[10] A.A. Pirzada, C. McDonald, Secure routing with the AODV protocol, 2005, Asia-Pacific Conference on Communications, IEEE. 

[11] S. Dokurer, Y.M.E. Acar, Performance Analysis of Ad-hoc Networks Under Selective Black hole Attacks, 2007, Proc: of the IEEE Southeast Con, pp.148-153. 

[12] B. Kannhavong et al., A survey of routing attacks in mobile ad hoc networks, 2007, IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91. 

[13] N. Kang, E.M. Shakshuki, T.R. Sheltami, Detecting misbehaving nodes in MANETs, 2010, Proceedings of the 12th international conference on information integration and web-based applications & services, ACM. 

[14] N. Komninos, D. Vergados, C. Douligeris, Detecting unauthorized and compromised nodes in Mobile Ad-hoc Networks, 2007, Ad Hoc Networks, vol. 5, pp. 289-298 

[15] N. Nasser, Y.F. Chen, Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad-hoc Networks, 2007, IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings. 

[16] N. Kang, T.R. Sheltami, EAACK—A Secure Intrusion-Detection System for MANETs, 2013, ieee transactions on industrial electronics, vol. 60, no. 3. 

[17] T. Latha, V. Sankaranarayanan, Prevention of co-operative black hole attack in MANET, 2008, Journal of networks, vol. 3, no. 5, pp. 13-20.