Abstract

Wireless Adhoc Network (WANET) significantly contributes to cost-effective network formulation due to decentralized and infrastructure-less schemes. One of the primary forms of WANET in Mobile Adhoc Network (MANET) is still evolving in research and a continued set of research problems associated with security. A review of existing security approaches shows that identifying malicious behavior in MANET is still an open-end problem irrespective of various methods. This paper introduces an improved DSR protocol mechanism of neighborhood monitoring scheme towards analyzing the malicious behavior in the presence of an unknown attacker of dynamic type. The proposed method contributes to deploying auxiliary relay nodes and retaliation nodes to control the communication process and prevent the attacker from joining the network. Using analytical research methodology, the proposed system can offer better communication performance with effective resistance from threats in MANET.

Highlights

  • The current research work is focused on deploying a security feature for identifying the threat followed by preventing the threat in Wireless Adhoc Network (WANET)

  • There is still limitation associated with it, viz. i) excessive usage of encryption or complex secure routing techniques leads to loss of balance between communication and security, ii) adherence to a specific form of the attacker, iii) less emphasis towards dynamic attacking strategy

  • The study is meant to resist multiple security threats; the formal model verification doesn't consider the dynamic alteration of attack strategy in Mobile Adhoc Network (MANET)

Read more

Summary

INTRODUCTION

The current research work is focused on deploying a security feature for identifying the threat followed by preventing the threat in Wireless Adhoc Network (WANET). Establishing a potential route among mobile nodes in a dynamic environment irrespective of various routing-based research approaches [3] Owing to this limitation in MANET, there is a likely probability for any mobile node to reject forwarding data packets and thereby act as a malicious node. I) excessive usage of encryption or complex secure routing techniques leads to loss of balance between communication and security, ii) adherence to a specific form of the attacker, iii) less emphasis towards dynamic attacking strategy If this problem is not solved that the secondary issues owing to the presence of malicious nodes cannot be solved, viz. There is less number of studies being investigated towards harnessing the potential of DSR protocol as the baseline of secure routing It is associated with a limitation which doesn’t facilitate the mobile nodes to carry out operations towards identifying malicious behavior of mobile nodes.

EXISTING TECHNIQUES
RESEARCH PROBLEM
RESEARCH METHODOLOGY
Strategies Towards DSR Implementation
Proposed Enhanced DSR Implementation
Algorithm Design
RESULT
DISCUSSION
Processing Time
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call