z-logo
open-access-imgOpen Access
Congestion Control Through IDA Process for Malicious Node in MANETs
Author(s) -
Seyed Amin Ahmadi Olounabadi*,
Avula. Damodaram,
V. Kamakshi Prasad,
Pvs Srinivas
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.f7499.038620
Subject(s) - computer network , computer science , mobile ad hoc network , wireless ad hoc network , vehicular ad hoc network , node (physics) , intrusion detection system , authentication (law) , computer security , network packet , wireless , engineering , telecommunications , structural engineering
Mobile Ad Hoc Network is an array of mobile networks that connect without a base station with each other. The networks are automatically established or on request when certain nodes come into the shared mobility region and agree to collaborate for the transmission and exchange of data. Because of its deployment nature, MANETs are more vulnerable to different type of attack. The reliability of the ad hoc mobile network is difficult due to its essential features including complex topology, a flexible format, limited power, limited bandwidth and remote communication. Mechanisms for protection such as encryption or authentication cannot alone identify harmful nodes in ad-hoc networks. Therefore, we propose and implement the Congestion control through Intrusion Detection Approach (IDA), this intrusion detection approach designed specifically for MANET. This tool can be used even in the case of incorrect wrongdoing reports to identify fraudulent nodes. This approach can identify extremely dangerous nodes, and thus improves protection and network efficiency, relative to other detection methods.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here