An Application Data Privacy Preservation Strategy for MANET 2ACK to Identify and Mitigate the Effect of Routing Issue

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2022 by IJETT Journal
Volume-70 Issue-7
Year of Publication : 2022
Authors : D. Naga Tej, K V Ramana
DOI : 10.14445/22315381/IJETT-V70I7P239

How to Cite?

D. Naga Tej, K V Ramana, "An Application Data Privacy Preservation Strategy for MANET 2ACK to Identify and Mitigate the Effect of Routing Issue" International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 377-387, 2022. Crossref,

Data privacy is concerned when transferring sensitive data over a multi-hop channel in Mobile Adhoc Networks (MANET). It is likely that undesirable data exposure could result in privacy violations and that this information will be used to launch various attacks against diverse targets. There are various ways for the confidentiality of Adhoc Nodes information may be protected, each of which is addressed in further detail below. However, the drawback of using these solutions in a MANET is that it requires high computational costs and significant time delays. A computational intelligence-based data privacy solution has been provided to keep the processing power to an absolute minimum. When defining the data characteristics that should be kept secret, it uses a data anonymization technique based on rough set theory to determine such characteristics. A diverse collection of trustworthy and neighbor nodes is selected during each routing phase, with the number of routes available changing dynamically. Data is delivered and received as a result of this selection. It is also stated that the identity of the recipient will remain anonymous. Various routing with network sizes was used to accomplish the work, which was completed by simulating it in various network sizes. The outcome of this study is quite beneficial in most circumstances for the Application of Data Privacy Preservation Strategy, which was the subject of this study.

2ACK, MANETs, Routing fault, Selfish node.

[1] D. K. Mishra, “Tutorial: Privacy Preservation in Manet: Issues and Challenges," 2012 Third International Conference on Intelligent Systems Modelling and Simulation, Kota Kinabalu, Malaysia, pp. 13-13, 2012.
[2] Jianguo Hao, Weidong Liu, and Yiqi Dai, “A Controllable Privacy Protection Framework in Position-Based Routing for Suspicious Manets," Iet International Conference on Wireless Sensor Network 2010 (Iet-Wsn 2010), Beijing, pp. 291-296, 2010.
[3] B. Kasiri, I. Lambadaris, F. R. Yu and H. Tang, “Privacy-Preserving Distributed Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio Manets," 2015 Ieee International Conference on Communications (Icc), London, Uk, pp. 7316-7321, 2015.
[4] S. Joshi, R. Sheikh and D. K. Mishra, “Schematize Trust Overlays and Management for Privacy Preservation in Manet," 2010 Second International Conference on Computational Intelligence, Modelling and Simulation, Bali, Indonesia, pp. 106-110, 2010.
[5] R. Sheikh, Mahakal Singh Chande and D. K. Mishra, “Security Issues in Manet: A Review," 2010 Seventh International Conference on Wireless and Optical Communications Networks - (Wocn), Colombo, Sri Lanka, pp. 1-4, 2010.
[6] S. A. Abbad and S. P. Godse, “Priority Based Emergency Message Forwarding Scheme for Time Critical Models in Vanet," 2016 Ieee International Conference on Advances in Electronics, Communication and Computer Technology (Icaecct), Pune, India, 393-398, 2016.
[7] M V Narayana, Aparnarajesh Atmakuri “A-Zhls: Adaptive Zhls Routing Protocol for Heterogeneous Mobile Adhoc Networks” International Journal of Engineering & Technology, vol.7, no.3, pp.1626- 1630, 2018.
[8] S. Joshi and D. K. Mishra, “A Roadmap Towards Trust Management & Privacy Preservation in Mobile Ad Hoc Networks," 2016 International Conference on Ict in Business Industry & Government (Ictbig), Indore, India, pp. 1-6, 2016.
[9] H. Kadhim and M. A. Hatem, “Secure Data Packet in Manet Based Chaos-Modified Aes Algorithm," 2019 2nd International Conference on Engineering Technology and Its Applications (Iiceta), Al-Najef, Iraq, pp. 208-213, 2019.
[10] A. El Hibaoui and L. Vallet, “Hypergraph Model for Anonymous Communications," 2012 International Conference on Multimedia Computing and Systems, Tangiers, Morocco, pp. 888-894, 2012.
[11] M V Narayana, Rishi Sayal, H.S. Saini, Aparna Manikonda “Timestamp Based Certified Routing for Authorization and Authentication in Mobile Ad Hoc Network” Journal of Advanced Research in Dynamical and Control Systems, vol.10, no.10,pp. 351-358. D. Naga Tej & K V Ramana / IJETT, 70(7), 377-387, 2022 386
[12] R. Barskar, M. Ahirwar and R. Vishwakarma, “Secure Key Management in Vehicular Ad-Hoc Network: A Review," 2016 International Conference on Signal Processing, Communication, Power and Embedded System (Scopes), Paralakhemundi, India, pp.1688-1694, 2016.
[13] Kim, M.; Jang, I.; Choo, S.; Koo, J.; Pack, S, “Collaborative Security Attack Detection in Software-Defined Vehicular Networks,” in Proceedings of the 2017 19th Asia-Pacific Network Operations and Management Symposium (Apnoms), Seoul, Korea, pp. 19–24, 2017.
[14] Liu, Kejun, Et Al, “an Acknowledgment-Based Approach for the Detection of Routing Misbehavior in Manets,” Ieee Transactions on Mobile Computing, vol.6, no.5, pp.536-550, 2007.
[15] Boopathi, G. Muruga, N. Insozhan, and S. Vinod, “Selfish Nodes Detection Using Random 2ack in Manet's,” Ijese, vol.1, no.4 , pp.3- 5, 2013.
[16] Kyasanur, P.; Vaidya, N.H, “Selfish Mac Layer Misbehavior in Wireless Networks,” Ieee Trans. Mob. Comput, vol. 4, 502–516, 2005. [Crossref]
[17] Guang, L.; Assi, C, “Mac Layer Misbehavior in Ad Hoc Networks,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering, Saskatoon, Sk, Canada 1–4 May 2005; pp. 1103–1106. [Crossref]
[18] Silva, B.M.C.; Rodrigues, J.J.P.C.; Kumar, N.; Han, G, “Cooperative Strategies for Challenged Networks and Applications: A Survey, “ Ieee Syst. J. vol.11, pp. 2749–2760, 2017. [Crossref]
[19] “Inet Framework Development Team. Inet Framework,” 2020. Available Online: Https://Inet.Omnetpp.Org/ (Accessed on 13 November 2020).
[20] Vij, A.; Sharma, V. Nand, P, “ Selfish Node Detection Using Game Theory in Manet,” in Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (Icacccn), Greater Noida (Up), India, pp. 104–109, 2018.[Crossref]
[21] Babu, S. Dilli, and Rajendra Pamula, “an Effective Block-Chain Based Authentication Technique for Cloud Based Iot,” International Conference on Advances in Computing and Data Sciences, Springer, Singapore, 2020.
[22] Salvakkam, Dilli Babu, and Rajendra Pamula, “Messb–Lwe: Multi-Extractable Somewhere Statistically Binding and Learning with Error-Based Integrity and Authentication for Cloud Storage,” the Journal of Supercomputing, pp.1-30, 2022.
[23] Salvakkam, Dilli Babu, and Rajendra Pamula, “Design of Fully Homomorphic Multikey Encryption Scheme for Secured Cloud Access and Storage Environment,” Journal of Intelligent Information Systems, pp.1-23, 2022.
[24] Lupia, A.; Rango, F.D, “A Probabilistic Energy-Efficient Approach for Monitoring and Detecting Malicious/Selfish Nodes in Mobile Ad-Hoc Networks,” in Proceedings of the 2016 Ieee Wireless Communications and Networking Conference, Doha, Qatar, pp. 1–6, 2016.
[25] Roselinmary, S.; Maheshwari, M.; Thamaraiselvan, M, “Early Detection of Dos Attacks in Vanet Using Attacked Packet Detection Algorithm (Apda),” in Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (Icices), Chennai, India, pp. 237–240, 2013.
[26] Singh, A.; Sharma, P, “A Novel Mechanism for Detecting Dos Attack in Vanet Using Enhanced Attacked Packet Detection Algorithm (Eapda),” in Proceedings of the 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (Raecs), Chandigarh, India, pp. 1–5, 2015.
[27] Ilavendhan, A.; Saruladha, K, “Comparative Analysis of Various Approaches for Dos Attack Detection in Vanets,” in Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (Icesc), Coimbatore, India, pp. 821–825, 2020.
[28] Wu, C.; Gerla, M.; Van Der Schaar, M, “Social Norm Incentives for Network Coding in Manets,” Ieee/Acm Trans. Netw. vol.25, pp.1761–1774, 2017.
[29] Buttyán, L.; Hubaux, J.P, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Netw. Appl. vol. 8, pp.579– 592, 2003. [Crossref]
[30] Meeran, A, “Enhanced System for Selfish Node Revival Based on Watchdog Mechanism,” in Proceedings of the 2017 International Conference on Trends in Electronics and Informatics (Icei), Tirunelveli, India, 11–12 May 2017; P. 6.
[31] Li, Z.; Shen, H, “Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks,” Ieee Trans. Mob. Comput, vol.11,pp.1287–1303, 2012. [Crossref]
[32] Khan, B.U.I.; Anwar, F.; Olanrewaju, R.F.; Pampori, B.R.; Mir, R.N, “A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission with Optimized Network Operations in Futuristic Mobile Adhoc Networks,” Ieee Access, vol.8, pp.124097– 124109, 2020.[Crossref]
[33] Yang, F.; Yan, J.; Guo, Y.; Luo, X, “Stackelberg-Game-Based Mechanism for Opportunistic Data Offloading Using Moving Vehicles,” Ieee Access, vol.7, pp.66435–166450, 2019. [Crossref]
[34] Al-Terri, D.; Otrok, H.; Barada, H.; Al-Qutayri, M.; Al Hammadi, Y, “Cooperative Based Tit-for-Tat Strategies to Retaliate Against Greedy Behavior in Vanets,” Comput. Commun,vol.104, pp.108–118, 2017.
[35] Xu, L.; Lin, Z.; Ye, A, “Analysis and Countermeasure of Selfish Node Problem in Mobile Ad Hoc Network,” in Proceedings of the 2006 10th International Conference on Computer Supported Cooperative Work in Design, Nanjing, China, pp. 1–4, 2006. [Crossref]
[36] Kampitaki, D.G.; Karapistoli, E.D.; Economides, A.A, “Evaluating Selfishness Impact on Manets,” in Proceedings of the 2014 International Conference on Telecommunications and Multimedia (Temu), Heraklion, Crete, Greece, pp. 64–68, 2014. [Crossref]
[37] Loudari, S.E.; Benamar, N, “Effects of Selfishness on the Energy Consumption in Opportunistic Networks: A Performance Assessment,” in Proceedings of the 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (Wits), Fez, Morocco,pp. 1–7, 2019.
[38] Narayana, M. V., G. Narsimha, and S. S. V. N. Sarma, “Genetic-Zhls Routing Protocol for Fault Tolerance and Load Balancing,” Journal of Theoretical & Applied Information Technology, vol. 83, no.1, 2016.
[39] Narayana, M. V., G. Narsimha, and S. S. V. N. Sarma, “Secure-Zhls: Secure Zone Based Hierarchical Link State Routing Protocol Using Digital Signature,” International Journal of Applied Engineering Research, Issn (2015): 0973-4562, 2015.
[40] Sirisati, Ranga Swamy, Et Al, “an Energy-Efficient Pso-Based Cloud Scheduling Strategy,” Innovations in Computer Science and Engineering, Springer, Singapore, pp.749-760, 2021.
[41] Narayana, M. V, “Route Optimization By Using Multiple Travelling Sales Person Problem in Manets,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol.3, no.1, pp.782-790, 2018.