Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Improved RED Strategy for Enhancement in Performance of MANETs

Author : Chetan Batra 1 Vishal Kumar Arora 2

Date of Publication :7th August 2015

Abstract: MANETs have been focused for many years but still it is main area for research due to its challenges. Various types of attacks and problem like congestion are major reasons for its existence in research. Various attacks are DOS attack, black hole attack, grey hole attack, wormhole attack, Sybil attack, fabrication attack and replay attack etc. congestion occurs when demand is greater than available resources. This problem can be avoided by RED (random early detection) scheme. Congestion can occurs due to various reasons like by replay attack, by limited resources, by link failure, by malicious attacker. Congestion lead to dos attack. In previous work congestion can be avoided by using improved RED. In our work we try to remove congestion by using improved random early detection scheme but the difference is, we using window size approach which in directly solves the denial of service attack. This approach doubles the security because if DOS is due to the retransmissions or replays then it can be detected by keep check on messages.

Reference :

    1. MahaAbdelhaq, Sami Serhan, RaedAlsaqour and Rosilah Hassan “A local Intrusion Detection Routing Security over MANET Network”, IEEE, July 2011, Bandung, Indonesia.
    2. YiebeltalFantahunAlem, Zhao Chenh Xuan, “ Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anamoly Detection”,2nd International Conference on Future Computer and Communication, IEEE, Volume 3, 2010
    3. S.Marti, T.J.Giuli, K.lai and M.bakery “Mitigating routing misbehaviour in mobile ad hoc networks”, 6th MobiCom, Boston, Massachusetts, August 2000.
    4. J.Sen, S.Koilakonda and A.Ukil, “A mechanism for detection of cooperative black hole attack in mobile ad hoc networks”, Second International Conference on Intelligent System, Modeling and Simulation ,Innovation lab, Tata consultancy services ltd. , Kolkata, 25-27January 2011.
    5. Rakesh Kumar Sahu, Dr. Narendra S. Chaudhari,“Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network”, November 2002.
    6. Sanjay Ramaswamy, Huirong Fu, John Dixon “Prevention Of Cooperative Black Hole Attack In Wireless Ad Hoc Network”, Department of Computer Science, IACC 258, North Dakota State University, Fargo, ND 58105.
    7. NishuKalia, KundanMunjal, “Multiple Black Hole Node Attack Detection Scheme In MANET By Modifying AODV Protocol” , International Journal of Engineering and Advanced Technology (IJEAT), Volume-2, Issue-3, February 2013
    8. Kartik Kumar Srivastava, AvinashTripathi, and Anjnesh Kumar Tiwari, “ Secure Data Transmission in MANET Routing Protocol” IJCTA , Int.J.Computer Technology &Applications,Vol 3 (6), 1915-1921 Nov-Dec 2012. Available online@www.ijcta.com
    9. Vineetha S. H. and Shebin Kurian, “Performance Analysis of Cluster Based Secure Multicast Key Management in MANET” International Journal of Computer Science and Telecommunications [Volume 4, Issue 4, April 2013.
    10. Merin Francis,M. Sangeetha, and Dr. A. Sabari, “A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013, ISSN: 2277 128X.
    11. J. Liebeherr, J. Wang, and G. Zhang. Programming overlay networks with overlay sockets. In Proc. 5th COST 264 Workshop on Networked Group Communications (NGC 2003), LNCS 2816, pages 242–253, Sep. 2003.
    12. H. Lundgren, E. Nordstrom, and C. Tschudin. Coping with communication grayzones in IEEE 802.11b. In Proc. of 5th ACM International Workshop on Wireless Mobile Multimedia (WoWMoM 2002), Sep. 2002.
    13. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang. Ursa: Ubiquitous and robust access control for mobile ad hoc networks. ACM/IEEE Transactions on Networking, 2005. To appear.
    14. C. E. Perkins and E. M. Royer. Ad-hoc on-demand distance vector routing. In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90– 100, Feb. 1999.
    15. K. Lakshmi et al. “Modified AODV Protocol Against Black hole Attacks in MANET” International Journal of Engineering and Technology Vol.2 (6), 2010, 444-449.
    16. H. Rangarajan “Robust loop-free on-demand routing in Ad-hoc networks” PhD dissertation, University of California, USA, June 2006.
    17. Chetan Batra,Vishal Arora,”RED Strategy for Improving Performance in MANET: A Review”, Journal of Information Sciences and Computing Technologies(JISCT,Volume 3, Issue 2, pp 217-221.
    18. Ranjeet Singh, and Prof .Harwant Singh Arri “COMPARISON OF AAMRP AND IODMRP USING SBPGP” International Journal of Computer Science and Management Research, Vol 2 Issue 3 March 2013.ISSN 2278-733X

Recent Article