DETECTING SINKHOLE ATTACK IN MANET USING OLSR ROUTING PROTOCOL WITH ARTIFICIAL INTELLIGENCE
Main Article Content
Abstract
Security is the most basic requirement in MANET so that the confidential information cannot be stolen by the hackers. Routing protocols attacks are mainly occurs in MANET to steal the information by informing them a wrong route. Sinkhole attack is one of the most commonly occurred attack in the MANET. In sinkhole attack, a burglar hops broadcast immoral routing message to produce itself as a specific hop and consider that a network will transfer all the information by itself. After entertaining whole network information, it modify the secret information, such as data packet may changes or drops the packets to make the network very complex. In the proposed work, OLSR (Proactive link state routing protocol) protocol will be used to find the route between source and destination within the Mobile –ad-hoc network. This protocol will used hello and topology control message to find the route within the network. The performance of OLSR will be improved by using OLSR in combination with ABC algorithm. ABC is an optimization technique that will used to improve the performance on the basis of population based search procedure. After applying these two approaches the performance parameters of the MANET like Throughput, delay, energy consumption and Bit error rate will be determined. Also, a classification technique known as artificial neural network will be applied to solve the problem occur in the network after applying ABC. Thus parameters like Throughput, Delay, Mean Square error, bit error rate and energy consumption will be calculated. The simulation of the research work will be carried out in MATLAB environment.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press.
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85-96.
Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647-4658.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Darwish, S. (2015). A simulation-based methodology for the assessment of server-based security architectures for mobile ad hoc networks (MANETs) (Doctoral dissertation, Brunel University London).
Arora, S. K., Puri, N., & Sharma, S. (2015). Performance analysis and detection and correction of sink hole attack in MANET. International Journal of Applied Engineering and research, 10(1), 12133-12144.
Singh, A., & Singh, T. (2016). Review on Detection and Prevention of Sink Hole Attack In network. Global Journal of Computers & Technology, 5(2), 289-292.
Sharma, S., & Jaswak, K. B. (2017). Mitigation of Sinkhole Attack in MANET Using ACO.
Singh, T. (2017). DESIGN AND ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR ROUTING (AODV) IN WIRELESS SENSOR NETWORK USING NEURAL NETWORK. Global Journal of Computers & Technology, 6(1), 344-353.
Hinton, G., Vinyals, O., & Dea Karaboga, D., Gorkemli, B., Ozturk, C., & Karaboga, N. (2014). A comprehensive survey: artificial bee colony (ABC) algorithm and applications. Artificial Intelligence Review, 42(1), 21-57.
.02531.
Kıran, M. S., & Fındık, O. (2015). A directed artificial bee colony algorithm. Applied Soft Computing, 26, 454-462.
Murthy, M. S. N., Sriram, G. G., & Abhiram, B. (2016). Enhanced bee colony optimization mechanism in content recommendation system.
Agrwal, S. L., Khandelwal, R., Sharma, P., & Gupta, S. K. (2016, October). Analysis of detection algorithm of Sinkhole attack & QoS on AODV for MANET. In Next Generation Computing Technologies (NGCT), 2016 2nd International Conference on (pp. 839-842). IEEE.
Tajinder deep singh & Harpreet kaur arora (2013). Detection and correction of sinkhole attack with novel method in wireless censor network using NS2 tools in international generals of computer