Critical Event Monitoring For Packet- Block-Mechanism in Wireless Ad Hoc Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-31 Number-2
Year of Publication : 2016
Authors : R.Latha, S.Sasikala
  10.14445/22312803/IJCTT-V31P115

MLA

R.Latha, S.Sasikala "Critical Event Monitoring For Packet- Block-Mechanism in Wireless Ad Hoc Networks". International Journal of Computer Trends and Technology (IJCTT) V31(2):84-88, January 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Wireless ad hoc network is a decentralized type of wireless network. The network is ad hoc because it does not have any fixed infrastructure. One basic assumption of routing protocols in wireless ad hoc networks is every node is honest and cooperative. This nature introduces many security attacks. One of the attacks is the malicious packet dropping. Packet dropping attack is the most vulnerable attack. When the route is established from source to destination the malicious node drop the packets. The malicious node create wrong route between from source to destination which is leads to undesirable situation. In this paper we calculate high detection accuracy on lost packets. The accuracy is calculated by autocorrelation function (ACF) based on number of packets sent and lost. Sleep Scheduling for event monitoring is used to pass the message to other nodes in the network when critical event is detected.

References
[1.] Bora Karaoglu, Wendi Heinemann, ”Cooperative Load Balancing and Dynamic Channel Allocation for Cluster- Based Mobile Ad HocNetworks”.IEEE transactions on mobile computing, vol. 14, no. 5, may 2015.
[2] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao,and Chin-Feng Lai, “Defending Against Collaborative Attacks by Malicious Nodes in manets: A Cooperative Bait Detection Approach” IEEE systems journal, vol. 9, no. 1, march 2015
[3] Xin Ming Zhang, Yue Zhang, Fan Yan, and Athanasios V. Vasilakos, “Interference-Based Topology Control Algorithm For Delay-Constrained Mobile Ad Hoc Networks”, IEEE transactions on mobile computing, vol. 14, no. 4, April 2015
[4] Karan Mitra, Arkady Zaslavsky, and Christer Åhlund,” Context- Aware QoE Modelling, Measurement, And Prediction in Mobile Computing Systems”, IEEE transactions on mobile computing, vol. 14, no. 5, may 2015
[5]Bodhy Krishna S "An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks ". International Journal of Computer Trends and Technology (IJCTT) V20(1):19-27, Feb 2015. ISSN:2231-2803.
[6] Vikram R. Desai, "Techniques for detection of malicious packet drops in networks", masters theses 1896 - february 2014
[7] Kennedy Edemacu, Martin Euku and Richard Ssekibuule ,” Packet drop attack detection techniques in wireless ad hoc networks: a review”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014 [8] Ze Li, Haiying Shen, “A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks”. IEEE transactions on mobile computing, vol. 13, no. 3, march 2014.
[9] Er. Priyanka goel , Dr. Pankaj kumar verma, “Detection and isolation of selective Packet drop attack in manet Using diffie - hellman algorithm”. International Journal of Latest Research in Science and Technology Volume 3, Issue 3: Page No. 137-139, May-June 2014
[10] Kshitij Bhargava, Dinesh Goyal, “Packet dropping attacks in Manet: a survey”. Journal of Advanced Computing and Communication Technologies, Volume No.2 Issue No. 3, June 2014
[11] You-Chiun Wang,” A Two-Phase Dispatch Heuristic to Schedule The Movement of Multi-Attribute Mobile Sensors in a Hybrid Wireless Sensor Network”, IEEE transactions on mobile computing, vol. 13, no. 4, April 2014.
[12] Glory Rashmi. A, Mr.C.Murugesh ,” Detection of Clone Nodes in Mobile Sensor Networks using Distributed and Localized Algorithms” International Journal of Inventions in Computer Science and Engineering Volume 1 Issue 2 2014
[13] Raju M, Selvan M,” An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey”, International Journal of Computer Science and Information Technologies, Vol. 5 (1) ,2014, 192-196
[14]S.Ganesan, B.Loganathan "A Survey of Ad-Hoc Network: A Survey" International Journal of Computer Trends and Technology (IJCTT),V4(8):2652-2655 August Issue 2013 .ISSN 2231-2803
[15] S.Vijayalakshmi, R.Kurinjimalar, S.Prakash, “Detection of Packet Dropping and Modification in Wireless Sensor Network”, International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: 2229-3345 Vol. 4 No. 04 April 2013.
[16] Shalini Sharma, Proff. Mr. Hitesh Gupta, Proff. Mr. Pankaj Kawadkar, “Reducing Packet Loss in MANET”, Network and Complex Systems, Vol.3, No.6, 2013.
[17] Khajonpong Akkarajitsakul, Ekram Hossain, Dusit Niyato, “Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach”, IEEE transactions on mobile computing, vol. 12, no. 5, may 2013.

Keywords
Wireless attack, Packet dropping, malicious node, attack detection, Sleep Scheduling.