578 520

Title

Secured Authentication of Node in Mobile Adhoc Network

  Prabu S. 1 * ,   Alekhya A. 2 ,   Kiran K. Chatragadda 3 ,   Venkateswarlu Lingala 4

1  Department of Electronics and Communication Engineering, Mahendra Institute of Technology (Autonomous), Namakkal, India
    (drsprabu@ieee.org)

2  Department of Electrical and Electronics Engineering, QIS College of Engineering and Technology, Autonomous, India
    (alekhya.anumala@qiscet.edu.in)

3  Department of Electrical and Electronics Engineering, QIS College of Engineering and Technology, Autonomous, India
    (kiran.ch@qiscet.edu.in)

4  Department of Electrical and Electronics Engineering, QIS College of Engineering and Technology, Autonomous, India
    (venkat.l@qiscet.edu.in)


Doi   :   https://doi.org/10.54216/IJWAC.050202

Received: March 19, 2022 Accepted: October 25, 2022

Abstract :

Over the previous two decades, wireless communication has developed into an indispensable component of modern life. In recent years, wireless networks have acquired greater significance than wired networks as a result of improvements in technology as well as reductions in cost. The adaptability and portability of wireless devices make this feasible in a wide variety of real-time software applications. One kind of wireless network, known as an Adhoc network, can establish a connection in locations where conventional communication is not feasible. The Mobile Adhoc Network, also known as MANET, is a sort of ad hoc network that is established by the collection of mobile nodes that are each outfitted with a transceiver and interact with one another over duplex connections. Every node in a MANET functions as a router and figures out how to go from the source to the destination by going via the other nodes in the network. MANET has a number of properties, including changeable capacity and bandwidth, energy-restricted operation, speed of deployment, and dynamic topology. Because of MANET's inherent fluidity, the network is more prone to experiencing security breaches. In recent years, researchers have developed a number of solutions to security problems, including intrusion detection, routing, security protocol, and other techniques. These solutions have been made available. Even though there are a few different options to choose from, none of them are enough to safeguard the network nodes. When more nodes are added to the network while it is operating in a hostile environment, the overall performance of the network suffers. Secured Authentication with Node Isolation, often known as SAWNI, is an authentication method that aims to improve network safety by locating and isolating any hostile nodes that may be present in a network. The approach of isolation may be used to protect the ordinary node while isolating the malicious node either temporarily or permanently, depending on the situation. The network's legitimacy is improved as a result of this isolation mechanism, which takes into account the potential danger posed by the rogue node. The findings of the experiments reveal that using DHA, rather than DSA, may raise the PDR by 2% while using CBDS can increase it by 1% when there is a significant proportion of malicious nodes and the node mobility is less than 10 meters per second. When compared to DHA, the DHA-SHORT results in a 22% reduction in the delay. Finally, in comparison to DSA, SAWNI results in an increase of 8% in PDR, whereas CBDS sees an increase of 7% when there is a significant proportion of malicious nodes moving at less than 10 meters per second.

Keywords :

Dual Hash Authentication; Mobile Adhoc Network; Optimized Routing Technique Routing; Secured Authentication Routing

References :

[1] Wald, L. (1999). Some terms of reference in the Internet of Things. IEEE Transactions on

geoscience and remote sensing, 37(3), 1190-1193.

[2] S. Jafar Ali Ibrahim and Thangamani, M ―Proliferators and Inhibitors Of Hepatocellular Ca,‖

Sonoma,‖ International Journal of Pure and Applied Mathematics (IJPAM) Special Issue of

Mathematical Modelling of Engineering Problems Vol 119 Issue. 15. July 2018 ISSN 1311-

8080, https://acadpubl.eu/hub/2018-119-16/1/94.pdf

[3] S. Idowu, ―Customer Segmentation Based on RFM Model Using K-Means, Hierarchical and

Fuzzy C- Means Clustering Algorithms,‖ no. August 2019, 2020, doi:

10.13140/RG.2.2.15379.71201.

Probl. Eng., vol. 2020, no. November 2017, 2020, doi:

[4] Meng, T., Jing, X., Yan, Z., & Pedrycz, W. (2020). A survey on machine learning for the Internet

of Things. Information Fusion, 57, 115-129.

[5] Khaleghi, B., Khamis, A., Karray, F. O., & Razavi, S. N. (2013). Multisensor Internet of Things:

A review of the state-of-the-art. Information fusion, 14(1), 28-44.

[6] J. Wu et al., ―An Empirical Study on Customer Segmentation by Purchase Behaviors Using an

RFM Model and K -Means Algorithm,‖ Math.

[7] Ibrahim, S. Jafar Ali, and M. Thangamani. "Prediction of Novel Drugs and Diseases for

Hepatocellular Carcinoma Based on Multi-Source Simulated Annealing Based Random

Walk." Journal of medical systems 42, no. 10 (2018): 188. https://doi.org/10.1007/s10916-018-

1038-y

[8] Hall, D. L., & Llinas, J. (1997). An introduction to multisensor Internet of Things. Proceedings of

the IEEE, 85(1), 6-23.

[9] Elhadi M Shakshuki, Nan Kang & Tarek R Sheltami 2013, ‗EAACK— A Secure Intrusion-

Detection System for MANETs‗, IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp.

1089-1098.

[10] Dube, Rais, CD, Wang, KY & Tripathi, SK 1997, ‗Signal stability based adaptive routing (SSA)

for Ad-hoc mobile networks‗, IEEE personal communications, pp. 36-45.

[11] Castanedo, F. (2013). A review of Internet of Things techniques. The scientific world

journal, 2013.

[12] C. Pascal, S. Ozuomba, and C. kalu, ―Application of K-Means Algorithm for Efficient Customer

Segmentation: A Strategy for Targeted Customer Services,‖ Int. J. Adv. Res. Artif. Intell., vol. 4,

no. 10, pp. 40–44, 2015, doi: 10.14569/ijarai.2015.041007.

[13] Bleiholder, J., & Naumann, F. (2009). Internet of Things. ACM computing surveys

(CSUR), 41(1), 1-41.

[14] Bhaumik A Patel & Hitesh Ishwardas, 2013, ‗Improvement in Routing for MANET using Double

Signature Security Scheme‗, Indian Journal of Research- Paripex, vol. 3, no. 4, pp. 150-152. 11.

Chakravarti, S & Mishra, A 2001, ‗QoS issues in Adhoc wireless networks‗, IEEE

Communication Magazine, vol. 39, pp. 142−148.

[15] Bar-Shalom, Y., Willett, P. K., & Tian, X. (2011). Tracking and Internet of Things (Vol. 11).

Storrs, CT, USA:: YBS publishing.

[16] A. M. A. Zamil and T. G. Vasista, ―Customer Segmentation Using RFM Analysis: Realizing

Through Python Implementation,‖ Pacific Bus. Rev. Int., vol. 13, no. 11, pp. 24-36 WEEmerging

Sources Citation Index (ESCI), 2021. doi: 10.1155/2020/8884227.

 


Cite this Article as :
Style #
MLA Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala. "Secured Authentication of Node in Mobile Adhoc Network." International Journal of Wireless and Ad Hoc Communication, Vol. 5, No. 2, 2022 ,PP. 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)
APA Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala. (2022). Secured Authentication of Node in Mobile Adhoc Network. Journal of International Journal of Wireless and Ad Hoc Communication, 5 ( 2 ), 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)
Chicago Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala. "Secured Authentication of Node in Mobile Adhoc Network." Journal of International Journal of Wireless and Ad Hoc Communication, 5 no. 2 (2022): 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)
Harvard Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala. (2022). Secured Authentication of Node in Mobile Adhoc Network. Journal of International Journal of Wireless and Ad Hoc Communication, 5 ( 2 ), 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)
Vancouver Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala. Secured Authentication of Node in Mobile Adhoc Network. Journal of International Journal of Wireless and Ad Hoc Communication, (2022); 5 ( 2 ): 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)
IEEE Prabu S., Alekhya A., Kiran K. Chatragadda, Venkateswarlu Lingala, Secured Authentication of Node in Mobile Adhoc Network, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 5 , No. 2 , (2022) : 19-29 (Doi   :  https://doi.org/10.54216/IJWAC.050202)