Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Enhanced Swarm Based Mac Layer Protocol for Lazy Receiving Process in Manets

Author : G. Nazia sulthana 1 Virendra kumar Sharma 2 Ranganath H.R 3

Date of Publication :20th December 2019

Abstract: Lazy Receiver Processing is new network subsystem architecture, which provides stable overload behavior, fair resource allocation, and increased throughput under heavy load from the network. Enhancements in the MAC layer protocol need increases the efficiency of scheduled process. Another major concern in LRP is security. The LRP network is always highly vulnerable to attackers due to wireless communication mediums. If any such attack occur in the network degrades the network performance and increases the overhead in the network. In this paper, our focus is to improve the network life time by enhancing scheduling process in MAC layer & enhancing detecting and diffusing attacks capabilities by improvements in AODV. Enhanced ant colony based AODV protocol for the analysis of gray and black hole attack effects. A comparative analysis is shown among EAACO (Energy aware ant colony optimization) and EAODV (Enhanced AODV) protocols. We compared the performance of these protocols based on various QoS parameters delay, control overhead, throughput and packet delivery ratio & alive nodes. The simulation results show that our protocol performance is better than others.

Reference :

    1. Mobile Ad Hoc Networking. Edited by Basagni, Conti Giordano, and Stojmenovic. Chapter-1, A JOHN WILEY & SONS, INC., PUBLICATION, 2004, pp.1- 47.
    2. Taher Delkesh & Mohammad Ali Jabraeil Jamali, “EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs”, Journal of Ambient Intelligence and Humanized Computing, Springer, • March 2018.
    3. M. Syed Khaja Mohideen and P. Calduwel Newton, “Energy Aware Ant Colony Optimization (ENAANT) to Enhance Throughput in Mobile Ad hoc Networks”, International Journal on Future Revolution in Computer Science & Communication Engineering , Volume: 4 Issue: 3, 2018, pp. 343 – 347.
    4. Heena Rani, Jasvir Singh, “Analysis of Swarm Intelligence Optimization Techniques used in MANETS: A Survey”, International Journal of Advanced Research in Computer Science Volume 8, No. 5, May-June 2017.
    5. Shobha arya and Chandrakala arya, “Malicious nodes detection in Mobile ad hoc networks “Journal of Information and Operations Management, Volume 3, Issue 1, 2012, pp.210-212.
    6. Meenakshi Tripathi,M.S.Gaur,V.Laxmi “Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN”, The 8th International Symposium on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks (IST-AWSN), Procedia Computer Science 19 ( 2013 ) 1101 – 1107.
    7. Vimal Kumar , Rakesh Kumar, “An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network”, International Conference on Intelligent Computing, Communication & Convergence (ICCC2014), Bhubaneswar, Odisha, India, Procedia Computer Science 48 ( 2015 ) 472 – 479
    8. Arvind Dhakaa, Amita Nandal and Raghuveer S. Dhaka, “Gray and Black Hole Attack Identification using Control Packets in MANETs”, Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015), Procedia Computer Science 54 ( 2015 ) 83 – 91.
    9. Parmar Amish ,V.B.Vaghela, “Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol”, 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79 ( 2016 ) 700 – 707.
    10. Arathy K S, Sminesh C N, “A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET”, Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016), Procedia Technology 25 ( 2016 ) 264 – 271.
    11. Benzeer Kaur and Harleen Kaur, “Detection of Black and Gray Hole Attack in Manet: A Review”, Advances in Computer Science and Information Technology (ACSIT)pp-ISSN: 2393-9907; e-ISSN: 2393- 9915; Volume 3, Issue 5; July-September, 2016, pp. 396- 400.
    12. T. Sasilatha, S. Vidhya and P. Suresh Mohan Kumar, “Detection and Elimination of Black Hole and Grey Hole Attack on MANET”, International Journal of Pure and Applied Mathematics, Volume 116 No. 24 2017, 235-242.
    13. Rupinder Kaur and Parminder Singh, “REVIEW OF BLACK HOLE AND GREY HOLE ATTACK”, The International Journal of Multimedia & Its Applications (IJMA) Vol.6, No.6, December 2014.
    14. Nisha, Simranjeet Kaur and Sandeep Arora, “Analysis Of Black Hole And Gray Hole Attack On RPAODV In MANET”, International Journal of Engineering Research & Technology (IJERT)Vol.2 Issue 8, August – 2013, pp.192.196.
    15. Vasantha Sandhya Venu and Damodaram Avula, “Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks”, Int J Commun Syst. 2018;31, PP.1-19.
    16. Swapnil S. Bhalsagar et al. , “Performance Evaluation Of Routing Protocol Under Black hole Attack In Manet And Suggested Security Enhancement Mechanisms”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-5 March, 2019.
    17. Shashi Gurung and Siddhartha Chauhan, “A dynamic threshold based approach for mitigating blackhole attack in MANET”, Wireless Networks, (2018) 24:2957–2971.
    18.  A.Rajaram, Dr. S. Palaniswami, “The TrustBased MAC-Layer Security Protocol for Mobile Ad hoc Networks”, International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010.
    19. Wenkai Wang and Yan (Lindsay) Sun, Husheng Li, Zhu Han, “Cross-Layer Attack and Defense in Cognitive Radio Networks”, IEEE GlobeCOM, 2010.

Recent Article