Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
نویسندگان
چکیده
In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the transmission over MANET because of uncentralized control on nodes. Since efficient route controls packets does not simplify between source destination. Hence maintenance becomes crucial process. Methods: critical enhance decrease attacker sustain successful transfers via Network. other hand, permits with security threads. The four processing schema are proposed this study work retain safeguards against Routing Protocols. Rushing Attacker has significantly influenced packet-based transfer, particularly node communication. Detection Automation Bee Colony Optimization (ADABCP) Method article. Results: Existing ESCT, ZRDM-LFPM, ENM-LAC techniques were compared suggested outcome. Consequently, transfer have enhanced illustration (SIRT-ADABCP-HRLD). Compared recommended approach, end-to-end latency, communication overhead, delivery ratio, network lifetime, energy usage all improved. Discussion: performance evaluation results SIRT–ADABCP-HRLD existing methods terms low End Delay (ms) 49.8361% ENM-LAC, ZRDM-LFPM. Communication Overhead, an 81.4462% methods. However, it improves by 56.9775%, more than consumption decreased 36.31% less value
منابع مشابه
Attacker Identification in Mobile Ad hoc Networks
A Mobile Ad-hoc network (MANET) is a multi-hop wireless network where nodes communicate with each other without any pre-deployed infrastructure. An attack is an attempt to bypass the security controls on a computer. The attack may alter, release, or deny data. Intrusion Detection System is a process of monitoring activities in a system, which can be a computer or network system. The mechanism b...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملRoute Maintenance in a Wireless Mobile Ad Hoc Network
A mobile ad-hoc network (MANET) is formed by a cluster of mobile hosts, each installed with a wireless transceiver, without the assistance of base stations. Due to the transmission range constraint of transceivers, two mobile hosts can communicate with each other either directly, if they are close enough, or indirectly, by having other mobile hosts relay their packets. Several routing protocols...
متن کاملEfficient Certificate Revocation of Attacker nodes using CCRVC in Mobile Ad Hoc Networks
Mobile Ad Hoc Networks (MANETs) is a selfconfiguring, infrastructure less network of mobile devices connected by wireless. The wireless and dynamic nature of MANET leads to various types of security attacks. The primary task is to provide the secure communication. To come across this challenge, we propose Cluster based Certificate Revocation with Vindication Capability scheme for certificate re...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Networks and Applications
سال: 2022
ISSN: ['1383-469X', '1572-8153']
DOI: https://doi.org/10.1007/s11036-022-02040-3