Efficient Dynamic Acknowledgement Scheme for MANET
Keywords:
How to cite this article: Thamizhmaran K. Efficient Dynamic Acknowledgement Schemefor Manet. J Adv Res Embed Sys 2020; 7(3&4): 1-6.Abstract
Mobile Adhoc Networks (MANET) is the decentralized type of network and it does not rely on pre-existing infrastructure. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. The Energy efficiency continues to be a key factor in limiting the deploy ability of ad-hoc networks. Deploying an energy efficient system exploiting the maximum life time of the network has remained a great challenge since years. The major concern in Wireless network in recent days is Energy consumption. There are numerous algorithms proposed to overcome this issue. In this paper proposed a new intrusion detection system is Enhanced Adaptive 3 Acknowledgement (EA3ACK) using Energy Efficiency Dynamic State (EEDS) algorithm. This algorithm is designed to increase the network lifetime and remaining energy by continuously monitoring the individual nodes in the network, thereby it increases the quality of service of the network. Network simulator (NS2) is used to implement & test our proposed system. The proposed EEDS- EA3ACK algorithm provides secure transmission & further it improves network performance.
How to cite this article:
Thamizhmaran K. Efficient Dynamic Acknowledgement Scheme for Manet. J Adv Res Embed Sys 2020; 7(3&4): 1-6.
References
[2] S. Subasree and N. K. Sakthivel “Design of a New Security Protocol Using Hybrid Cryptography Algorithmsâ€, IJRRAS vol.2 no.2, pp., 2010.
[3] Nidal Nasser and Yunfeng Chen “Enhanced Intrusion Detection System for Discovering Malicious Nodes n in Mobile Ad hoc Networksâ€, IEEE Comm Society, 2007.
[4] Subhankar Mishra, Sudhansu Mohan Satpathy and Abhipsa Mishra, “ Energy Efficiency In Ad Hoc Networksâ€, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
[5] mohanaradhya , K.A. Sumithradevi, Andhe Dharani, Vijay singh , “ Clustering methodologies and their implications in sensor networksâ€, published in springer
[6] Nan Kang, Elhadi et.al “Detecting Misbehaving Nodes in MANETsâ€, International conference on Advanced Information Networking and Applications, pp.488-494, 2010.
[7] Elhadi, M. Shakshuki, Nan Kang and Tarek R. Sheltami “EAACK—A Secure Intrusion-Detection System for MANETsâ€, IEEE Trans on industrial electronics, vol. 60, no. 3, pp.1089-1098, 2013.
[8] Abdulsalam Basabaaa, et al, “Implementation of A3ACKs intrusion detection system under various mobility speedsâ€, 5th International Conf. on Ambient Systems, Networks and Technologies, pp.571-578, 2014.
[9] K. Liu, J. Deng, P. K. Varshney et al, “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs,†IEEE Trans. Mobile Comput., vol.6, no.5, pp.536–550, 2007.
[10] Balakrishnan, K.; Jing Deng; Varshney, V.K., "TWOACK: preventing selfishness in mobile ad hoc networks," Wireless Communications and Networking Conference, vol.4, no.10, pp. 2137-2142, 2005.
[11] Al-Roubaiey, A.; Sheltami, T.; et al “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," 24th IEEE Conf. on AINA, pp.634-640, 2010.
[12] D. Johnson, D.A. Maltz and J. Broch, “The dynamic source routing protocol for mobile ad hoc networksâ€, Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, pp., 1998.
[13] S. Ramanathan and M. Steenstrup, A survey of routing techniques for mobile communication networks, Mobile Networks and Applications vol., no., pp.89–104, 1996.
[14] Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang,â€Security in Mobile Ad hoc Networks: Challenges and Solutionsâ€, UCLA Computer Science Department, pp., 2010.
[15] Jongoh Choi, Si-Ho Cha, GunWoo Park, and Joo Seok Song. â€Malicious Nodes Detection in AODV-Based Mobile Ad Hoc Networksâ€, GESTS Trans. Comp. Science and Engr., Vol.18, No.1 pp.49-55, 2005.
[16] A Rajaram, S. Palaniswami, “Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol†(IJCSIT) Int. Journal of Com Sci and Information Technologies, Vol.1, no.2, pp., 2010.
[17] Aishwarya Sagar Anand Ukey, Meenu Chawla, “Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANETâ€, IJCSI, Vol.7, No.4 (1), 2010.
[18] Shio Kumar Singh 1 , M P Singh 2 , and D K Singh 3 “ Energy Efficient Homogenous Clustering Algorithm for Wireless Sensor Networksâ€, International Journal of Wireless & Mobile Networks ( IJWMN ), Vol.2, No.3, August 2010
[19] Sasikala,M.Sc.,M.Phil.,2A.Nithya “Clustering In Wireless Sensor Networks: A Survey 1Mâ€, International Journal of Computer Trends and Technology (IJCTT) – volume 17 number 3 – Nov 2014
[20] Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan “Energy-Efficient Communication Protocol for Wireless Microsensor Networksâ€, Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, Hawaii.
[21] Deosarkar B. P. , Yada N. S. , Yadav R. P. , "Cluster Head Selection in Clustering Algorithms for Wireless Sensor Networks: A Survey", In Proceedings of the 2008 International Conference on Computing, Communication and Networking, Virgin Islands, USA.
[22] Xue Q, Ganz A. , "Maximizing sensor network lifetime: analysis and design guides", In the Proceedings of the 2004 military communications conference, vol. 2, Monterey, CA, 2004. pp. 1144–1150.
[23] G. Lukachan, M. Labrador, "SELAR: Scalable Energy- Efficient Location Aided Routing Protocol for Wireless Sensor Networks," In Proc. 29th Annual IEEE International Conference on Local Computer Networks, USA, Florida, 2004, pp. 694-695.
[24] Aslam N. , Phillips W. , Robertson W. , Sivakumar S. , "A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks" Inf. Fusion 2011, vol. 12, pp. 202–212.
[25] S. C. Ergen, P. Varaiya, "On Multi-Hop Routing for Energy Efficiency," IEEE Commun.Lett. , 2005, Vol. 9, Issue 10, pp. 880-881.
[26] Qin Lv, Edith Cohen ,Scott Shenker “ Search and Replication in Unstructured Peer-to-Peer Networksâ€, ICS '02 Proceedings of the 16th international conference on Supercomputing
[27] E. Cohen and S. Shenker. “Replication strategies in unstructured peer-to-peer network’sâ€. In Proceedings of ACM SIGCOMM’02, Aug. 2002.
[28] Giwon On, Jens Schmitt, Ralf Steinmetz “QoS Controlled Dynamic Replication in Peer-to-Peer Systems†2016 International Conference on Engineering and Technology (ICET).