HIASA: Hybrid Improved Artificial Bee Colony and Simulated Annealing based Attack Detection Algorithm in Mobile Ad-hoc Networks (MANETs)
Journal: Bonfring International Journal of Industrial Engineering and Management Science (Vol.7, No. 2)Publication Date: 2017-05-31
Authors : P.V.S. Siva Prasad; Dr.S. Krishna Mohan Rao;
Page : 01-12
Keywords : Mobile Ad-hoc Network (MANET); Routing Protocols; Attack Detection; Hybrid Improved Artificial Bee Colony and Simulated Annealing (HIASA); Artificial Bee Colony (ABC); Simulated Annealing (SA) Enhancement; Security; Performance Metrics.;
Abstract
A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less network of mobile devices in which every device is wireless, be in motion devoid of constraint and be a router to get across traffic unrelated to its individual use. Each device ought to be organized to persistently maintain the information, mandatory for routing the traffic. Furthermore this is the major confront in constructing a MANET. As of a security design viewpoint, MANETs contain no apparent line of defense; that is to say no integral security. Therefore, the wireless channel is available to both legal network users and malevolent invaders. Consequently the `attack investigation is a difficult issue, particularly in MANET where there are only some well-known attacks. Presently, numerous competent routing protocols have been presented for MANET. The majority of these protocols presume a trusted and supportive environment. On the other hand, in the subsistence of malevolent nodes, the networks are susceptible to various types of attacks. In this work a new Hybrid Improved Artificial bee colony and Simulated annealing (HIASA) based attack identification algorithm is proposed to examine various kinds of attacks. The presented HIASA based Attack Detection (HIASA-AD) utilize Artificial Bee Colony (ABC) and Simulated Annealing (SA) algorithm to resolve various types of attacks for instance sybil attacks, wormhole attacks, routing attacks. Fundamental behavior of the nodes, attacks was identified amid source to destination all through Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols. An attack could be decomposed into some mixtures of fundamental events. Afterward define taxonomy of anomalous basic events by examining the fundamental security objectives. AODV and DSR routing protocols are examined in relation to throughput, Packet Delivery Ratio (PDR), and End to End (E2E) Delay. The functioning of AODV is superior to DSR in relation to PDR, throughput, and E2E delay. As the DSR is a reactive routing protocol, it is containing a smaller amount end to end delay as contrast to AODV. These AODV and DSR routing protocols are simulated by Network Simulator-2(NS2) to authorize HIASA-AD algorithm.
Other Latest Articles
- Rule Generation for Gallbladder Cancer Prediction Using Decision Tree Classifier
- Mammogram Image Segmentation by Watershed Algorithm and Classification through k-NN Classifier
- Blood profile of growing dromedary camel fed varying levels of dried Gawo (Faidherbia albida) leaves in the Northern Guinea Savannah of Nigeria
- Assessment of roundworm species prevalence in cattle, sheep and goats slaughtered at Lafia Abattoir, Nasarawa State, Nigeria
- Evaluation of fermented locust bean meal (Parkia biglobosa) as replacement to soybean meal on production performance, blood profile and gut morphology of broiler chicken
Last modified: 2018-10-26 20:41:53