Behavior Based High Performance Protocol for MANET

This paper presents a Behavior Based High Performance (BBHP) protocol for MANET that involves the existing protocols and solutions to their best advantages instead of developing from scratch. Our system is defined as an intelligent system consisting of a behavior monitoring system, knowledge base, an inference engine and the execution system. The knowledge base consists of a set of rules defined using input and output metrics. The input metrics involve threats, mobility, network size and cooperation level and output metrics involve all the existing protocols and solutions used for secured routing. The inference engine decides the best solutions on the basis of observed behavior. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Ki-Hyung Kim,et al.  Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[3]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[6]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[7]  Maysam F. Abbod,et al.  IMAN: An Intelligent MANET routing system , 2010, 2010 17th International Conference on Telecommunications.

[8]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[9]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[10]  Gadadhar Sahoo,et al.  A Novel Methodology for Securing Ad Hoc Network by Friendly Group Model , 2013 .

[11]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[12]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[13]  N. H. Saeed,et al.  Intelligent Manet Optimisation System , 2012 .

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  Gadadhar Sahoo,et al.  Humanistic approach in mobile ad hoc network: HAMANET , 2013, ArXiv.

[16]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[17]  Mario Gerla,et al.  GloMoSim: A Scalable Network Simulation Environment , 2002 .

[18]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.