An enhanced performance through agent-based secure approach for mobile ad hoc networks

ABSTRACT This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

[1]  Yuan Gao,et al.  Fuzzy logic-based dynamic routing management policies for mobile ad hoc networks , 2005, HPSR. 2005 Workshop on High Performance Switching and Routing, 2005..

[2]  Dongman Lee,et al.  An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols , 2013, IEEE Communications Letters.

[3]  A. Hellany,et al.  Wireless Ad-hoc networks: Using fuzzy trust approach to improve security between nodes , 2009, 2009 International Conference on Computer Engineering & Systems.

[4]  Ashutosh Kumar Singh,et al.  An optimised fuzzy clustering for wireless sensor networks , 2014 .

[5]  Subramaniam Shamala,et al.  Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks , 2007, Int. Arab J. Inf. Technol..

[6]  Mahesh Motwani,et al.  REVIEW OF WEIGHTED CLUSTERING ALGORITHMS FOR MOBILE AD HOC NETWORKS , 2012 .

[7]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[8]  Baolin Sun,et al.  Fuzzy Controllers Based Multipath Routing Algorithm in MANET , 2012 .

[9]  Ji Luo,et al.  An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks , 2006, Fuzzy Sets Syst..

[10]  Bradford W. Parkinson,et al.  Global positioning system : theory and applications , 1996 .

[11]  Yueh-Ming Huang,et al.  Fuzzy logic weighted multi-criteria of dynamic route lifetime for reliable multicast routing in ad hoc networks , 2008, Expert Syst. Appl..

[12]  Michael P. Howarth,et al.  Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..

[13]  Siegfried Gottwald,et al.  Fuzzy sets and formal logics , 2015, Fuzzy Sets Syst..

[14]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.

[15]  C. Palanisamy,et al.  Overview of AODV , DSDV and RWMM 3 . 1 Ad Hoc on-demand distance vector routing ( AODV ) , 2018 .

[16]  Roopam Gupta,et al.  Performance optimisation through EPT-WBC in mobile ad hoc networks , 2016 .

[17]  Ashutosh Kumar Singh,et al.  Fuzzy logic based clustering in wireless sensor networks: a survey , 2013 .

[18]  Bhupendra Verma,et al.  An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..

[19]  Seema Bawa,et al.  A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..

[20]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[21]  Sumit Ghosh,et al.  A survey of recent advances in fuzzy logic in telecommunications networks and new challenges , 1998, IEEE Trans. Fuzzy Syst..

[22]  Qiang Liu,et al.  A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[23]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[24]  D. Pesch,et al.  Multi-metric routing decisions for ad hoc networks using fuzzy logic , 2004, 1st International Symposium onWireless Communication Systems, 2004..

[25]  Aikaterini Mitrokotsa,et al.  Evaluation of classification algorithms for intrusion detection in MANETs , 2012, Knowl. Based Syst..

[26]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[27]  Rui Dinis,et al.  The Impact of Node's Mobility on Link-Detection Based on Routing Hello Messages , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[28]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[29]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[30]  Sajal K. Das,et al.  WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.

[31]  Roopam Gupta,et al.  Scalability enhancement of AODV using local link repairing , 2014 .

[32]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[33]  Indranil Sengupta,et al.  STACRP: a secure trusted auction oriented clustering based routing protocol for MANET , 2012, Cluster Computing.

[34]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.