Quantum Based Adaptive Topology Control for Intrusion Detection and Isolation in Manet

نویسنده

  • M. S. Shashidhara
چکیده

1Asst. Professor, Department of Computer Science, Asan Memorial College of Arts and Science, Chennai, India. 2Head of the Department, Department of MCA, The Oxford College of Engineering, Bangalore, India. ---------------------------------------------------------------------***--------------------------------------------------------------------ABSTRACT:A mobile ad hoc network (MANET) is an infrastructure-less network where the number of mobile nodes is independently moved in a random direction within the transmission range of the network. Due to the movement of mobile nodes, the network topology is changed arbitrarily. Therefore, various intrusions are presented in MANET. For accurate and robust intrusion detection against several attack and deceiving actions, SIEVE technique was designed in MANET. However, node mobility of the ad hoc network restricts the BP algorithm efficiency and it’s difficult to identify attack behavior. Therefore, security is a most important concern in decentralized structure of mobile network. In order to develop the intrusion detection and isolation in MANET, Quantum based Adaptive Topology Control (QATC) technique is developed. In QATC, an adaptive topology control is designed to adjust the transmission range of the mobile nodes to extend the lifetime of networks by retaining the network connectivity. This topology leaves maximum possible nodes connected in a cluster zone with minimum energy consumption and transmission interference. This helps to increase the packet delivery ratio. After this, the arriving and leaving nodes are monitored and the malicious node is identified from the network, through Quantum Mechanism. Quantum mechanism is typically used to detect the malicious node from the network using specific key distribution. Due to this, the malicious nodes are easily detected and isolated, aiming at improving the Malicious node detection rate with minimum time. A simulation result shows that the Quantum based Adaptive Topology Control (QATC) technique achieves higher packet delivery ratio, malicious node detection rate and reduces energy consumption, and time to identify the malicious node compared to state-ofthe-works.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks

This paper addresses how to perform cost-sensitive responses to routing attacks on (Mobile Ad Hoc Networks) MANET. There have been numerous research efforts on securing MANET protocols using cryptography or intrusion detection technique. However, little literature on MANET intrusion response is addressed. Most research on automated response for wired networks focuses on how to select the best r...

متن کامل

A Survey of Performance based Secure Routing Protocols in MANET

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and TORA are used. As the network is wireless, se...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017