Zone based Hierarchical Link State for Detecting Malicious Node and Black Hole Attack Detection for Mobile Ad hoc Networks
Autor: | T. Priyanka |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2022 |
Předmět: | |
DOI: | 10.5281/zenodo.7127731 |
Popis: | Upcoming years of emerging end efficient research work is focused on wireless network like cellular network and ad hoc network is two classifications, cellular network is fixed and centralized router and ad hoc is dynamic and distributed router. In this paper is based on ad hoc network called mobile ad hoc networks (MANET) is collection of separate mobile nodes, the following network is affect different challenging issues such as security, energy, packet loss/drop, traffic. Security to affect many parameters because drop and retransmitting, so I focused security accepts to detected and eliminate misbehaviour node and block hole attacks using hybrid routing protocol namely, Modified - Zone based Hierarchical Link State routing protocol Network Simulator (NS2). {"references":["1.\tThamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.","2.\tKrishnamoorthy, T., & Arivazhagan, A. D. (2015, January). Energy efficient routing protocol with ad hoc on-demand distance vector for MANET. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.","3.\tThamizhmaran, K., Arivazhagan, A. D., & Anitha, M. (2015, January). Co-operative analysis of proactive and reactive protocols using Dijkstra's Algorithm. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.","4.\tVennila, K., & Thamizhmaran, K. (2017). Implementation of Multilevel Thresholding on Image using Firefly Algorithm. International Journal of Advanced Research in Computer Science, 8(3).","5.\tThamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.","6.\tThamizhmaran, K., Anitha, M., & Nachiappan, A. (2017). Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm. International Journal of Mobile Network Design and Innovation, 7(2), 88-100.","7.\tNo, I., & Thamizhmaran, K. (2017). Modified ABR (M-ABR) routing protocol with multi-cost parameters for effective communication in MANETs. Int J Adv Res Comput Sci, 8(1), 288-291.","8.\tThamizhmaran, K., Anitha, M., & Nachiappan, A. (2018). Reduced End-To-End Delay for Manets using SHSP-EA3ACK Algorithm. i-Manager's Journal on Communication Engineering and Systems, 7(3), 9.","9.\tThamizhmaran, K. (2020). Acknowledgement based Topology Control using Hybrid Cryptography for MANETS. i-Manager's Journal on Information Technology, 9(2), 36.","10.\tThamizhmaran, K. (2020). CLUSTER BASED DATA COLLECTION SCHEME FOR VANET. Journal on Software Engineering, 14(4)."]} |
Databáze: | OpenAIRE |
Externí odkaz: |