Performance Analysis of Efficiently trusted AODV serving Security in MANET under Blackhole Attack Using Genetic Algorithm
文献类型: 会议论文
第一作者: Iram Nausheen
作者: Iram Nausheen 1 ; Akhilesh Upadhyay 1 ;
作者机构: 1.Department of Electronics & Communication, SAGE University, Indore, India
关键词: Wireless communication;Wireless sensor networks;Throughput;Routing protocols;Performance analysis;Topology;Security
会议名称: International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics
主办单位:
页码: 1127-1131
摘要: The mobile nodes or systems in mobile ad hoc networks wirelessly transmit binary data. The topology of the network is dynamic. Therefore, because of the network's wireless nature, sensitive data is vulnerable to uninvited external attackers, sometimes known as data theft or loss by an attacking or malicious node For the network to operate more efficiently and to preserve safe connectivity, these hostile nodes must be identified. A trust based routing protocol is proposed here with genetic algorithm to identify the attack in MANET using AODV protocol. The performance analysis is made using NS2 simulator with AODV under attack and with proposed trusted algorithm(ETSAODV) using GA under blackhole attack. In terms of network lifetime and characteristics like throughput and packet delivery ratio in simulation, it maximises the network's performance.
分类号: tp1
- 相关文献
[1]Implementation of Edge Computing Network Architecture based on Routing Protocol. Rahul Patel,Lalji Prasad. 2023
[2]ETSAODV: An Efficient and Trusted Secure AODV with Performance Analysis for MANETS suffering Blackhole Attack. Iram Nausheen,Akhilesh Upadhyay. 2023
[3]Design of an IOT Intra-Venious System for Patient Monitoring. Tanios Tawk,Antonio El Sarrouh,Roy Abi Zeid Daou. 2023
[4]An Efficient Wireless Power Transmitter Based on Companded OFDM Signals. Santiago Ferná,ndez,Fernando Gregorio,F. Javier Ló,pez-Martí,nez,Juan Cousseau. 2021
[5]Fraud Detection in IoT-Based Financial Transactions Using Anomaly Detection Techniques. Kafila,Mohammad Hassan,Ch Veena,Atul Singla,Amit Joshi,Melanie Lourens. 2024
[6]Digital government's critical enabler. Philip Seltsikas,Matthew Dunlap,Georgia K. Marsh,Brent Crossland,Dan Combs. 2008
作者其他论文 更多>>
-
ETSAODV: An Efficient and Trusted Secure AODV with Performance Analysis for MANETS suffering Blackhole Attack
作者:Iram Nausheen;Akhilesh Upadhyay
关键词:Wireless communication;Protocols;Wildlife;Medical services;Routing;Ad hoc networks;Performance analysis
-
Design of an Augmented Clustering Model using LEACH & PEGASIS for Low Complexity & High Network Lifetime
作者:Jaya Raut;Akhilesh Upadhyay
关键词:Knowledge engineering;Heart;Adaptation models;Power demand;Wireless networks;Scalability;Stochastic processes