Review on Packet drop prevention in MANET by counter based digester ACK

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-8
Year of Publication : 2020
Authors : Dr. Mohammed Ali Hussain, Dr. Balaganesh Duraisamy
DOI :  10.14445/22315381/IJETT-V68I8P218S

Citation 

MLA Style: Dr. Mohammed Ali Hussain, Dr. Balaganesh Duraisamy  "Review on Packet drop prevention in MANET by counter based digester ACK" International Journal of Engineering Trends and Technology 68.8(2020):102-107. 

APA Style:Dr. Mohammed Ali Hussain, Dr. Balaganesh Duraisamy. Review on Packet drop prevention in MANET by counter based digester ACK  International Journal of Engineering Trends and Technology, 68(8), 102-107.

Abstract
Mobile ad hoc network is an infrastructure less, constrained resource, and peer to peer wireless network with adaptation and, self-forming capabilities. The network is well suited for deploying in disaster relief and emergency applications, and demands reliable communication. Communication is enable by finding the path between communicating entities and forwarding the information through it. In literature number of routing protocols designed to achieve the reliable communication. Routing protocols vulnerable towards the packet drops due to their consideration such as nodes in a network are supportive for communication. Nodes drop the packets due to either malicious behaviour or insufficient resources. In literature several intrusion detection mechanisms have been designed to address the problem. Recently counter based digested Acknowledgement (CDACK) is designed to prevent the packet drops in MANET. The paper aim is to investigate the performance of the CDACK protocol and compare it with existing intrusion detection mechanisms designed for MANET. Results indicate that the CDACK protocol is well suited for MANET to prevent packet dropping nodes from communication path.

Reference

[1] Hussain, Mohammed Ali, and Balaganesh Duraisamy. "Preventing Malicious Packet Drops in MANETs by Counter Based Authenticated Acknowledgement Preventing Malicious Packet Drops in MANETs by Counter Based Authenticated Acknowledgement."May 2020 Ingénierie des systèmes d information 25(2):173- 181
[2] Mohammad, A.A.K., Mahmood, A.M., Vemuru, S. (2019). “Intentional and unintentional misbehaving node detection and prevention in the mobile ad hoc network”. International Journal of Hybrid Intelligence, 1(2-3): 239- 267. https://doi.org/10.1504/IJHI.2019.103580
[3] Siddiqua, A., Sridevi, K., Mohammed, A.A.K. (2015). “Preventing black hole attacks in MANETs using secure knowledge algorithm”. 2015 International Conference on Signal Processing and Communication Engineering Systems,
[4] Meitei, Moirangthem Goldie, and Biswaraj Sen. "A study on few approaches to counter security breaches in MANETs." Advances in Communication, Cloud, and Big Data. Springer, Singapore, 2019. 105-116.
[5] Marathe, Nilesh, and Subhash K. Shinde. "ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing." Wireless Personal Communications 107.1 (2019): 393- 416.
[6] Schweitzer, Nadav, et al. "Detecting bottlenecks on-the-fly in olsr based manets." 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI). IEEE, 2014.
[7] De Rango, Floriano, et al. "A new distributed application and network layer protocol for voip in mobile ad hoc networks." IEEE Transactions on Mobile Computing 13.10 (2014): 2185-2198.
[8] Kim, Dongkyun, et al. "Power-aware routing based on the energy drain rate for mobile ad hoc networks." Proceedings. Eleventh International Conference on Computer Communications and Networks. IEEE, 2002.
[9] Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami. "EAACK—a secure intrusion-detection system for MANETs." IEEE transactions on industrial electronics 60.3 (2012): 1089-1098.
[10] Nadeem, Adnan, and Michael P. Howarth. "A survey of MANET intrusion detection & prevention approaches for network layer attacks." IEEE communications surveys & tutorials 15.4 (2013): 2027-2045.
[11] Liu, Kejun, et al. "An acknowledgment-based approach for the detection of routing misbehavior in MANETs." IEEE transactions on mobile computing 6.5 (2007): 536- 550.
[12] Banerjee, Sukla. "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks." proceedings of the world congress on engineering and computer science. 2008.
[13] Abbas, Sohail, Madjid Merabti, and David Llewellyn- Jones. "A survey of reputation based schemes for MANET." The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK. 2010.
[14] Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.
[15] Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Providing Security Towards the MANETs Based on Chaotic Maps and Its Performance." Microelectronics, Electromagnetics and Telecommunications. Springer, Singapore, 2019. 145-152.
[16] Thachil, F., Shet, K.C. (2012). “A trust-based approach for AODV protocol to mitigate black hole attack in MANET”. 2012 International Conference on Computing Sciences,Phagwara, India. https://doi.org/10.1109/ICCS.2012.7
[17] Mason, John C., and David C. Handscomb. Chebyshev polynomials. CRC Press, 2002.
[18] Zhu, Hongfeng. "Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture." Wireless Personal Communications 82, no. 3 (2015): 1697-1718.
[19] Floyd, Sally, and Van Jacobson. "Random early detection gateways for congestion avoidance." IEEE/ACM Transactions on networking 1, no. 4 (1993): 397-413.
[20] Sultanuddin S.J., Hussain M.A. (2019), “Routing protocol for manet: Token based energy efficient qos aware routing using hybrid optimization algorithms”, International Journal of Recent Technology and Engineering, 7(6), PP.574-582.
[21] [21]Jayanthi E., Hussain M.A. (2019), “Reliable white list management technique for warned nodes in MANET”’, International Journal of Vehicle Information and Communication Systems, 4(4), PP.299-315.
[22] [22]Srinivasa Rao Y., Ali Hussain M. (2019), “Adaptive quality of service medium access control protocol for IEEE 802.11 based mobile Ad hoc network”, International Journal of Innovative Technology and Exploring Engineering, 8(4), PP.430-433.
[23] Balamuralikrishna T., Hussain M.A. (2019), “A framework for evaluating performance of MADA-AODV protocol by considering multi-dimensional parameters on MANET”, Smart Innovation, Systems and Technologies, 104(), PP.163-174.
[24] Suma P., Hussain M.A. (2018),”Secure and effective random paths selection (SERPS) algorithm for security in MANETs”,International Journal of Engineering and Technology(UAE),7 (2),PP. 134-138.
[25] Suresh Babu B., Hussain M.A., Geethanjali N. (2018), “Adaptive and efficient routing model for MANET using TSCH network”,Journal of Advanced Research in Dynamical and Control Systems,10 (0),PP. 267-278.
[26] Srinivasa Rao Y., Hussain M.A. (2018), “Dynamic MAC protocol to enhancing the quality of real time traffic in MANET using network load adaptation”, Journal of Advanced Research in Dynamical and Control Systems,10 (0),PP. 1612-1617.
[27] Suma P., Nagaraju O., Hussain M.A. (2017), “Node disjoint random and optimal path selection (NDROPS) algorithm for security in MANETS”, International Journal of Electrical and Computer Engineering,7(3),PP.1197- 1203.
[28] Kolagani P., Aditya K., Venkatesh N., Kiran K.V.D. (2017), “Multi cross protocol with hybrid topography control for manets”,Journal of Theoretical and Applied Information Technology,95(3),PP.457-467.
[29] Chavan G.T., Srikanth V. (2018), “Zone based routing protocol with improved location estimation for MANET”, ARPN Journal of Engineering and Applied Sciences,13 (11),PP. 3650-3656.

Keywords
MANETs, Packet drop, malicious, resource, intrusion detection