Evaluation Of Enhanced Swarm Based Mac Layer Protocol Over Secured Lazy Receiver Processing In Manets

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-8
Year of Publication : 2019
Authors : G. Nazia sulthana, Virendra kumar sharma
  10.14445/22312803/IJCTT-V67I8P114

MLA

MLA Style:G. Nazia sulthana, Virendra kumar sharma"Evaluation Of Enhanced Swarm Based Mac Layer Protocol Over Secured Lazy Receiver Processing In Manets" International Journal of Engineering Trends and Technology 67.8 (2019):81-86.

APA Style G. Nazia sulthana, Virendra kumar sharma. Evaluation Of Enhanced Swarm Based Mac Layer Protocol Over Secured Lazy Receiver Processing In ManetsInternational Journal of Engineering Trends and Technology, 67(8),81-86.

Abstract
Lazy Receiver Processing is new network subsystem architecture, which provides stable overload behavior, fair resource allocation, and increased throughput under heavy load from the network. A major concern in LRP is security. The LRP network is always highly vulnerable to attackers due to wireless communication mediums. If any such attack occur in the network degrades the network performance and increases the overhead in the network. In this paper, our focus is to improve the network life time by enhancing scheduling process in MAC layer & enhancing detecting and diffusing attacks capabilities by improvements in AODV. A comparative analysis is shown among EAACO (Energy aware ant colony optimization) and EAODV (Enhanced AODV) protocols. ESLRP( Enhanced Security based Lazy Receiver Process) is compared with SLRP (Secured LRP).We compared the performance of these protocols based on various QoS parameters delay, control overhead, throughput and packet delivery ratio & alive nodes. The simulation results show that our protocol performance is better than others.

Reference
[1] Mobile Ad Hoc Networking. Edited by Basagni, Conti, Giordano, and Stojmenovic. Chapter-1, A JOHN WILEY & SONS, INC., PUBLICATION, 2004, pp.1-47.
[2] Taher Delkesh & Mohammad Ali Jabraeil Jamali, “EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs”, Journal of Ambient Intelligence and Humanized Computing, Springer, · March 2018.
[3] M. Syed Khaja Mohideen and P. Calduwel Newton, “Energy Aware Ant Colony Optimization (ENAANT) to Enhance Throughput in Mobile Ad hoc Networks”, International Journal on Future Revolution in Computer Science & Communication Engineering , Volume: 4 Issue: 3, 2018, pp. 343 – 347.
[4] Heena Rani, Jasvir Singh, “Analysis of Swarm Intelligence Optimization Techniques used in MANETS: A Survey”, International Journal of Advanced Research in Computer Science Volume 8, No. 5, May-June 2017.
[5] Shobha arya and Chandrakala arya, “Malicious nodes detection in Mobile ad hoc networks “Journal of Information and Operations Management, Volume 3, Issue 1, 2012, pp.210-212.
[6] Meenakshi Tripathi,M.S.Gaur,V.Laxmi “Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN”, The 8th International Symposium on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks (IST-AWSN), Procedia Computer Science 19 ( 2013 ) 1101 – 1107.
[7] Vimal Kumar , Rakesh Kumar, “An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network”, International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014), Bhubaneswar, Odisha, India, Procedia Computer Science 48 ( 2015 ) 472 – 479.
[8] Arvind Dhakaa, Amita Nandal and Raghuveer S. Dhaka, “Gray and Black Hole Attack Identification using Control Packets in MANETs”, Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015), Procedia Computer Science 54 ( 2015 ) 83 – 91.
[9] Parmar Amish ,V.B.Vaghela, “Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol”, 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79 ( 2016 ) 700 – 707.
[10] Arathy K S, Sminesh C N, “A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET”, Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016), Procedia Technology 25 ( 2016 ) 264 – 271.
[11] Benzeer Kaur and Harleen Kaur , “Detection of Black and Gray Hole Attack in Manet: A Review”, Advances in Computer Science and Information Technology (ACSIT)pp-ISSN: 2393-9907; e-ISSN: 2393-9915; Volume 3, Issue 5; July-September, 2016, pp. 396-400.
[12] T. Sasilatha, S. Vidhya and P. Suresh Mohan Kumar, “Detection and Elimination of Black Hole and Grey Hole Attack on MANET”, International Journal of Pure and Applied Mathematics, Volume 116 No. 24 2017, 235-242.
[13] Rupinder Kaur and Parminder Singh, “REVIEW OF BLACK HOLE AND GREY HOLE ATTACK”, The International Journal of Multimedia & Its Applications (IJMA) Vol.6, No.6, December 2014.
[14] Nisha, Simranjeet Kaur and Sandeep Arora, “Analysis Of Black Hole And Gray Hole Attack On RPAODV In MANET”, International Journal of Engineering Research & Technology (IJERT)Vol.2 Issue 8, August – 2013, pp.192.196.
[15] Vasantha Sandhya Venu and Damodaram Avula, “Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks”, Int J Commun Syst. 2018;31, PP.1-19.
[16] Swapnil S. Bhalsagar et al. , “Performance Evaluation Of Routing Protocol Under Black hole Attack In Manet And Suggested Security Enhancement Mechanisms”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-5 March, 2019.
[17] Shashi Gurung and Siddhartha Chauhan, “A dynamic threshold based approach for mitigating black-hole attack in MANET”, Wireless Networks, (2018) 24:2957–2971.
[18] A.Rajaram, Dr. S. Palaniswami, “The TrustBased MAC-Layer Security Protocol for Mobile Ad hoc Networks”, International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010
[19] Wenkai Wang and Yan (Lindsay) Sun, Husheng Li, Zhu Han, “Cross-Layer Attack and Defense in Cognitive Radio Networks”, IEEE GlobeCOM, 2010.
[20] G. Nazia sulthana, V.K. Sharma, “A Security architecture to mitigate cross layer malicious attacks in lazy receiver processing(LRP) network subsystem”, Journal of emerging technologies and innovative research(JETIR) ISSN:2349-5162, volume 6 Issue-1 Jan 2019.

Keywords
MANET, LRP, Black Hole, Gray Hole Attack, malicious node.