Efficient Dynamic Acknowledgement Scheme for MANET
Abstract
Mobile Adhoc Networks (MANET) is the decentralized type of network and it does not rely on pre-existing infrastructure. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. The Energy efficiency continues to be a key factor in limiting the deploy ability of ad-hoc networks. Deploying an energy efficient system exploiting the maximum life time of the network has remained a great challenge since years. The major concern in Wireless network in recent days is Energy consumption. There are numerous algorithms proposed to overcome this issue. In this paper proposed a new intrusion detection system is Enhanced Adaptive 3 Acknowledgement (EA3ACK) using Energy Efficiency Dynamic State (EEDS) algorithm. This algorithm is designed to increase the network lifetime and remaining energy by continuously monitoring the individual nodes in the network, thereby it increases the quality of service of the network. Network simulator (NS2) is used to implement & test our proposed system. The proposed EEDS- EA3ACK algorithm provides secure transmission & further it improves network performance.
How to cite this article:
Thamizhmaran K. Efficient Dynamic Acknowledgement Scheme for Manet. J Adv Res Embed Sys 2020; 7(3&4): 1-6.
References
[2] S. Subasree and N. K. Sakthivel “Design of a New Security Protocol Using Hybrid Cryptography Algorithms”, IJRRAS vol.2 no.2, pp., 2010.
[3] Nidal Nasser and Yunfeng Chen “Enhanced Intrusion Detection System for Discovering Malicious Nodes n in Mobile Ad hoc Networks”, IEEE Comm Society, 2007.
[4] Subhankar Mishra, Sudhansu Mohan Satpathy and Abhipsa Mishra, “ Energy Efficiency In Ad Hoc Networks”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
[5] mohanaradhya , K.A. Sumithradevi, Andhe Dharani, Vijay singh , “ Clustering methodologies and their implications in sensor networks”, published in springer
[6] Nan Kang, Elhadi et.al “Detecting Misbehaving Nodes in MANETs”, International conference on Advanced Information Networking and Applications, pp.488-494, 2010.
[7] Elhadi, M. Shakshuki, Nan Kang and Tarek R. Sheltami “EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE Trans on industrial electronics, vol. 60, no. 3, pp.1089-1098, 2013.
[8] Abdulsalam Basabaaa, et al, “Implementation of A3ACKs intrusion detection system under various mobility speeds”, 5th International Conf. on Ambient Systems, Networks and Technologies, pp.571-578, 2014.
[9] K. Liu, J. Deng, P. K. Varshney et al, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol.6, no.5, pp.536–550, 2007.
[10] Balakrishnan, K.; Jing Deng; Varshney, V.K., "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, vol.4, no.10, pp. 2137-2142, 2005.
[11] Al-Roubaiey, A.; Sheltami, T.; et al “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," 24th IEEE Conf. on AINA, pp.634-640, 2010.
[12] D. Johnson, D.A. Maltz and J. Broch, “The dynamic source routing protocol for mobile ad hoc networks”, Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, pp., 1998.
[13] S. Ramanathan and M. Steenstrup, A survey of routing techniques for mobile communication networks, Mobile Networks and Applications vol., no., pp.89–104, 1996.
[14] Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang,”Security in Mobile Ad hoc Networks: Challenges and Solutions”, UCLA Computer Science Department, pp., 2010.
[15] Jongoh Choi, Si-Ho Cha, GunWoo Park, and Joo Seok Song. ”Malicious Nodes Detection in AODV-Based Mobile Ad Hoc Networks”, GESTS Trans. Comp. Science and Engr., Vol.18, No.1 pp.49-55, 2005.
[16] A Rajaram, S. Palaniswami, “Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol” (IJCSIT) Int. Journal of Com Sci and Information Technologies, Vol.1, no.2, pp., 2010.
[17] Aishwarya Sagar Anand Ukey, Meenu Chawla, “Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET”, IJCSI, Vol.7, No.4 (1), 2010.
[18] Shio Kumar Singh 1 , M P Singh 2 , and D K Singh 3 “ Energy Efficient Homogenous Clustering Algorithm for Wireless Sensor Networks”, International Journal of Wireless & Mobile Networks ( IJWMN ), Vol.2, No.3, August 2010
[19] Sasikala,M.Sc.,M.Phil.,2A.Nithya “Clustering In Wireless Sensor Networks: A Survey 1M”, International Journal of Computer Trends and Technology (IJCTT) – volume 17 number 3 – Nov 2014
[20] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, Hawaii.
[21] Deosarkar B. P. , Yada N. S. , Yadav R. P. , "Cluster Head Selection in Clustering Algorithms for Wireless Sensor Networks: A Survey", In Proceedings of the 2008 International Conference on Computing, Communication and Networking, Virgin Islands, USA.
[22] Xue Q, Ganz A. , "Maximizing sensor network lifetime: analysis and design guides", In the Proceedings of the 2004 military communications conference, vol. 2, Monterey, CA, 2004. pp. 1144–1150.
[23] G. Lukachan, M. Labrador, "SELAR: Scalable Energy- Efficient Location Aided Routing Protocol for Wireless Sensor Networks," In Proc. 29th Annual IEEE International Conference on Local Computer Networks, USA, Florida, 2004, pp. 694-695.
[24] Aslam N. , Phillips W. , Robertson W. , Sivakumar S. , "A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks" Inf. Fusion 2011, vol. 12, pp. 202–212.
[25] S. C. Ergen, P. Varaiya, "On Multi-Hop Routing for Energy Efficiency," IEEE Commun.Lett. , 2005, Vol. 9, Issue 10, pp. 880-881.
[26] Qin Lv, Edith Cohen ,Scott Shenker “ Search and Replication in Unstructured Peer-to-Peer Networks”, ICS '02 Proceedings of the 16th international conference on Supercomputing
[27] E. Cohen and S. Shenker. “Replication strategies in unstructured peer-to-peer network’s”. In Proceedings of ACM SIGCOMM’02, Aug. 2002.
[28] Giwon On, Jens Schmitt, Ralf Steinmetz “QoS Controlled Dynamic Replication in Peer-to-Peer Systems” 2016 International Conference on Engineering and Technology (ICET).