ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

HIASA: Hybrid Improved Artificial Bee Colony and Simulated Annealing based Attack Detection Algorithm in Mobile Ad-hoc Networks (MANETs)

Journal: Bonfring International Journal of Industrial Engineering and Management Science (Vol.7, No. 2)

Publication Date:

Authors : ; ;

Page : 01-12

Keywords : Mobile Ad-hoc Network (MANET); Routing Protocols; Attack Detection; Hybrid Improved Artificial Bee Colony and Simulated Annealing (HIASA); Artificial Bee Colony (ABC); Simulated Annealing (SA) Enhancement; Security; Performance Metrics.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less network of mobile devices in which every device is wireless, be in motion devoid of constraint and be a router to get across traffic unrelated to its individual use. Each device ought to be organized to persistently maintain the information, mandatory for routing the traffic. Furthermore this is the major confront in constructing a MANET. As of a security design viewpoint, MANETs contain no apparent line of defense; that is to say no integral security. Therefore, the wireless channel is available to both legal network users and malevolent invaders. Consequently the `attack investigation is a difficult issue, particularly in MANET where there are only some well-known attacks. Presently, numerous competent routing protocols have been presented for MANET. The majority of these protocols presume a trusted and supportive environment. On the other hand, in the subsistence of malevolent nodes, the networks are susceptible to various types of attacks. In this work a new Hybrid Improved Artificial bee colony and Simulated annealing (HIASA) based attack identification algorithm is proposed to examine various kinds of attacks. The presented HIASA based Attack Detection (HIASA-AD) utilize Artificial Bee Colony (ABC) and Simulated Annealing (SA) algorithm to resolve various types of attacks for instance sybil attacks, wormhole attacks, routing attacks. Fundamental behavior of the nodes, attacks was identified amid source to destination all through Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols. An attack could be decomposed into some mixtures of fundamental events. Afterward define taxonomy of anomalous basic events by examining the fundamental security objectives. AODV and DSR routing protocols are examined in relation to throughput, Packet Delivery Ratio (PDR), and End to End (E2E) Delay. The functioning of AODV is superior to DSR in relation to PDR, throughput, and E2E delay. As the DSR is a reactive routing protocol, it is containing a smaller amount end to end delay as contrast to AODV. These AODV and DSR routing protocols are simulated by Network Simulator-2(NS2) to authorize HIASA-AD algorithm.

Last modified: 2018-10-26 20:41:53