Skip to main content
Erschienen in: Soft Computing 18/2019

12.03.2019 | Focus

Defending against false data attacks in 3D grid-based MANET using soft computing approaches

verfasst von: B. Muneeswari, M. S. K. Manikandan

Erschienen in: Soft Computing | Ausgabe 18/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quality of service (QoS) is one of the major factors for current applications in mobile ad hoc networks (MANET). Due to the limited wireless link capabilities, a path with heavy load will lost battery within short period of time and maximizes the possibility of path disconnection and packet drops. Hence, optimal path is necessary to increase residual energy of the node. Dual CHs are selected by mobile node energy level, distance and expected relative mobility. The dual CH selection considers the residual energy of nodes, average distance to neighbors and number of neighbor nodes. Previously proposed multipath routing techniques reduce network traffic among multiple routes paths instead of sending packets via only one path. There are two research issues are still arisen in multipath routing that are packet redundancy and quality. We address these issues in the proposed optimal routing paradigm where the best path is selected instead of routing among all available paths. We propose hybrid routing scheme that combines type 2 fuzzy logic system to find available paths from source to the destination node and particle swarm optimization to identify a best path among the selected paths. Due to the lack of central monitoring system in MANET, security breach called false data injection attack may occur. To reveal this task, false data predicted on the source digital signature by upcoming cluster member. We implement our proposed approach in 3D grid-based MANET environment using NS3.26. We also compare our proposed approach performance with the conventional 2D routing schemes. Finally, the proposed approach shows higher QoS than others.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abarghouei BE, Farokhtala A, Alizadeh M (2015) DNACK: false data detection based on negative acknowledgement and digital signature on mobile ad hoc network. Wirel Pers Commun 83:1–15CrossRef Abarghouei BE, Farokhtala A, Alizadeh M (2015) DNACK: false data detection based on negative acknowledgement and digital signature on mobile ad hoc network. Wirel Pers Commun 83:1–15CrossRef
Zurück zum Zitat Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682CrossRef Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682CrossRef
Zurück zum Zitat Bhanumathi V, Dhanasekaran R (2015) Efficient data transfer in mobile ad hoc network using OPSM for disaster response applications. J Appl Res Technol 13:392–401CrossRef Bhanumathi V, Dhanasekaran R (2015) Efficient data transfer in mobile ad hoc network using OPSM for disaster response applications. J Appl Res Technol 13:392–401CrossRef
Zurück zum Zitat Bisen D, Sharma S (2018a) An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int J Electron 105(1):1–22CrossRef Bisen D, Sharma S (2018a) An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int J Electron 105(1):1–22CrossRef
Zurück zum Zitat Bisen D, Sharma S (2018b) Fuzzy based detection of malicious activity for security assessment of MANET. Natl Acad Sci Lett 41(1):23–28CrossRef Bisen D, Sharma S (2018b) Fuzzy based detection of malicious activity for security assessment of MANET. Natl Acad Sci Lett 41(1):23–28CrossRef
Zurück zum Zitat Chaudhry R, Tapaswi S, Kumar N (2018) Forwarding zone enabled PSO routing with network lifetime maximization in MANET. Appl Intell 48(9):3053–3080CrossRef Chaudhry R, Tapaswi S, Kumar N (2018) Forwarding zone enabled PSO routing with network lifetime maximization in MANET. Appl Intell 48(9):3053–3080CrossRef
Zurück zum Zitat Devi VS, Hegde NP (2018) Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wirel Pers Commun 100:923–940CrossRef Devi VS, Hegde NP (2018) Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wirel Pers Commun 100:923–940CrossRef
Zurück zum Zitat Gambhir S, Tomar P (2012) Optimal path selection routing protocol in MANETs. Int J Sci Eng Res 3(7):1 Gambhir S, Tomar P (2012) Optimal path selection routing protocol in MANETs. Int J Sci Eng Res 3(7):1
Zurück zum Zitat Gurumoorthy KB, Nirmal Kumar A (2017) Mutual constraint based GA suggested routing algorithm for improving QoS in clustered in MANETs. Wirel Pers Commun 98(3):2975–2991CrossRef Gurumoorthy KB, Nirmal Kumar A (2017) Mutual constraint based GA suggested routing algorithm for improving QoS in clustered in MANETs. Wirel Pers Commun 98(3):2975–2991CrossRef
Zurück zum Zitat Irin Dorathy PE, Chnadrasekaran M (2015) Distance based dual path ad hoc on demand distance vector routing protocols for mobile ad hoc networks. In: International conference on advanced computing and communication systems, Coimbatore, India Irin Dorathy PE, Chnadrasekaran M (2015) Distance based dual path ad hoc on demand distance vector routing protocols for mobile ad hoc networks. In: International conference on advanced computing and communication systems, Coimbatore, India
Zurück zum Zitat Jain HR, Sharma SK (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: IEEE international conference on advances in engineering and technology research (ICAETR-2014) Jain HR, Sharma SK (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: IEEE international conference on advances in engineering and technology research (ICAETR-2014)
Zurück zum Zitat Khatoon N, Amritanjali (2017) Mobility aware energy efficient clustering for MANET: a bio-inspired approach with particle swarm optimization. Wirel Commun Mob Comput 2017:1–12CrossRef Khatoon N, Amritanjali (2017) Mobility aware energy efficient clustering for MANET: a bio-inspired approach with particle swarm optimization. Wirel Commun Mob Comput 2017:1–12CrossRef
Zurück zum Zitat Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multipath routing using energy. CSIT 5:235–246CrossRef Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multipath routing using energy. CSIT 5:235–246CrossRef
Zurück zum Zitat Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy firefly integrated particle swarm optimization based intrusion detection and prevention for secure routing of MANET. Int J Comput Netw Commun 10(1):13–33CrossRef Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy firefly integrated particle swarm optimization based intrusion detection and prevention for secure routing of MANET. Int J Comput Netw Commun 10(1):13–33CrossRef
Zurück zum Zitat Kumar S, Mehfuz S (2016a) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115CrossRef Kumar S, Mehfuz S (2016a) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115CrossRef
Zurück zum Zitat Kumar S, Mehfuz S (2016b) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115CrossRef Kumar S, Mehfuz S (2016b) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115CrossRef
Zurück zum Zitat Mafirabadza C, Khatri P (2017) Efficient power aware AODV routing protocol for MANET. Wirel Pers Commun 97(4):5707–5717CrossRef Mafirabadza C, Khatri P (2017) Efficient power aware AODV routing protocol for MANET. Wirel Pers Commun 97(4):5707–5717CrossRef
Zurück zum Zitat Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: IEEE international conference on information technology for organizations development (IT4OD) Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: IEEE international conference on information technology for organizations development (IT4OD)
Zurück zum Zitat Nagaratna M, Manasa C (2013) Optimized path selection based on multi criteria in MANET. Int J Adv Trends Comput Sci Eng 2(6):38–41 Nagaratna M, Manasa C (2013) Optimized path selection based on multi criteria in MANET. Int J Adv Trends Comput Sci Eng 2(6):38–41
Zurück zum Zitat Singh G, Kumar N, Verma AK (2014) OANTALG: an orientation based ant colony algorithm for mobile ad hoc networks. Wirel Pers Commun 77(3):1859–1884CrossRef Singh G, Kumar N, Verma AK (2014) OANTALG: an orientation based ant colony algorithm for mobile ad hoc networks. Wirel Pers Commun 77(3):1859–1884CrossRef
Zurück zum Zitat Vamsi R, Kant K (2017) Generalized trust model for cooperative routing in MANETs. Wirel Pers Commun 97:4385–4412CrossRef Vamsi R, Kant K (2017) Generalized trust model for cooperative routing in MANETs. Wirel Pers Commun 97:4385–4412CrossRef
Metadaten
Titel
Defending against false data attacks in 3D grid-based MANET using soft computing approaches
verfasst von
B. Muneeswari
M. S. K. Manikandan
Publikationsdatum
12.03.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 18/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03899-3

Weitere Artikel der Ausgabe 18/2019

Soft Computing 18/2019 Zur Ausgabe