Makespan of routing and security in Cross Centric Intrusion Detection System (CCIDS) over black hole attacks and rushing attacks in MANET

被引:6
|
作者
Rajendran, N. [1 ]
Jawahar, P. K. [2 ]
Priyadarshini, R. [1 ]
机构
[1] BS Abdur Rahman Crescent Inst Sci & Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
[2] BS Abdur Rahman Crescent Inst Sci & Technol, Dept Elect & Instrumentat Engn, Chennai, Tamil Nadu, India
基金
欧盟地平线“2020”;
关键词
Routing; Security policy; Cross Centric Intrusion Detection System; Mobile makes span; Routing algorithm; Self-configuring networks; BANDWIDTH-SATISFIED MULTICAST; QOS; PROTOCOL; ALGORITHM; NETWORKS; QUALITY; DESIGN; TREES; NODE;
D O I
10.1108/IJIUS-03-2019-0021
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Purpose The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network. Design/methodology/approach It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment's performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node. Findings The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches. Social implications When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput. Originality/value The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.
引用
收藏
页码:162 / 176
页数:15
相关论文
共 41 条
  • [1] Cross centric intrusion detection system for secure routing over black hole attacks in MANETs
    Rajendran, N.
    Jawahar, P. K.
    Priyadarshini, R.
    [J]. COMPUTER COMMUNICATIONS, 2019, 148 : 129 - 135
  • [2] An Enhanced Intrusion Detection System for Routing Attacks in MANET
    Abirami, K. Rama
    Sumithra, M. G.
    Rajasekaran, J.
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [3] RETRACTED ARTICLE: A Novel Intrusion Detection System to Alleviate the Black Hole Attacks to Improve the Security and Performance of the MANET
    M. Kowsigan
    J. Rajeshkumar
    B. Baranidharan
    N. Prasath
    S. Nalini
    K. Venkatachalam
    [J]. Wireless Personal Communications, 2022, 127 : 3 - 3
  • [4] Security Issues of Black Hole Attacks in MANET
    Ranjan, Rakesh
    Singh, Nirnemesh Kumar
    Singh, Ajay
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 452 - 457
  • [5] RETRACTED: A Novel Intrusion Detection System to Alleviate the Black Hole Attacks to Improve the Security and Performance of the MANET (Retracted Article)
    Kowsigan, M.
    Rajeshkumar, J.
    Baranidharan, B.
    Prasath, N.
    Nalini, S.
    Venkatachalam, K.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (SUPPL 1) : 3 - 3
  • [6] Hybrid Detection of Black hole and Gray hole attacks in MANET
    Rathiga, P.
    Sathappan, S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 135 - 140
  • [7] Certain Investigation on MANET Security with Routing and Blackhole Attacks Detection
    Vinayagam, Jaikumar
    Balaswamy, Ch.
    Soundararajan, K.
    [J]. 2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019, 2019, 165 : 196 - 208
  • [8] Hierarchical Energy Efficient Intrusion Detection System for Black Hole Attacks in WSNs
    Athmani, Samir
    Boubiche, Djallel Eddine
    Bilami, Azeddine
    [J]. WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [9] A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET
    Arathy, K. S.
    Sminesh, C. N.
    [J]. 1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 264 - 271
  • [10] A Study and Enhancement to the Security of MANET AODV Protocol against Black Hole Attacks
    Fu, Yulong
    Li, Guoquan
    Atiquzzaman, Mohammed
    Cao, Jin
    Yan, Zheng
    Li, Hui
    [J]. 2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1431 - 1436