Abstract

Over the previous two decades, wireless communication has developed into an indispensable component of modern life. In recent years, wireless networks have acquired greater significance than wired networks as a result of improvements in technology as well as reductions in cost. The adaptability and portability of wireless devices make this feasible in a wide variety of real-time software applications. One kind of wireless network, known as an Adhoc network, can establish a connection in locations where conventional communication is not feasible. The Mobile Adhoc Network, also known as MANET, is a sort of ad hoc network that is established by the collection of mobile nodes that are each outfitted with a transceiver and interact with one another over duplex connections. Every node in a MANET functions as a router and figures out how to go from the source to the destination by going via the other nodes in the network. MANET has a number of properties, including changeable capacity and bandwidth, energy-restricted operation, speed of deployment, and dynamic topology. Because of MANET's inherent fluidity, the network is more prone to experiencing security breaches. In recent years, researchers have developed a number of solutions to security problems, including intrusion detection, routing, security protocol, and other techniques. These solutions have been made available. Even though there are a few different options to choose from, none of them are enough to safeguard the network nodes. When more nodes are added to the network while it is operating in a hostile environment, the overall performance of the network suffers. Secured Authentication with Node Isolation, often known as SAWNI, is an authentication method that aims to improve network safety by locating and isolating any hostile nodes that may be present in a network. The approach of isolation may be used to protect the ordinary node while isolating the malicious node either temporarily or permanently, depending on the situation. The network's legitimacy is improved as a result of this isolation mechanism, which takes into account the potential danger posed by the rogue node. The findings of the experiments reveal that using DHA, rather than DSA, may raise the PDR by 2% while using CBDS can increase it by 1% when there is a significant proportion of malicious nodes and the node mobility is less than 10 meters per second. When compared to DHA, the DHA-SHORT results in a 22% reduction in the delay. Finally, in comparison to DSA, SAWNI results in an increase of 8% in PDR, whereas CBDS sees an increase of 7% when there is a significant proportion of malicious nodes moving at less than 10 meters per second.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call