z-logo
open-access-imgOpen Access
Comparative Analysis of Intrusion Detection System in Reactive Routing Protocols of Mobile Adhoc Networks
Author(s) -
Manish Devendra Chawhan,
Ausaf Umar Khan,
K. D. Kulat,
Bhumika Neole
Publication year - 2021
Publication title -
international journal of next-generation computing
Language(s) - English
Resource type - Journals
eISSN - 2229-4678
pISSN - 0976-5034
DOI - 10.47164/ijngc.v12i5.432
Subject(s) - computer network , computer science , intrusion detection system , network packet , routing protocol , mobile ad hoc network , packet drop attack , ad hoc on demand distance vector routing , throughput , distance vector routing protocol , node (physics) , flooding (psychology) , link state routing protocol , wireless , computer security , engineering , telecommunications , psychology , structural engineering , psychotherapist
Mobile Nodes in Mobile Adhoc Network (MANET) interact wirelessly with the neighbor nodes without aid ofcentral management. They are subject to a variety of attacks, including as the black hole, insider, grey hole,wormhole, flooding attack, and packet drop, all of which severely impair secure communication. This paperincorporated an intrusion detection system (IDS) into a reactive MANET routing protocol, such as Adhoc OnDemand Distance Vector (AODV), for the detection and prevention of malicious nodes. To make a comparisonwith the implemented IDSAODV, the existing NetSim code of Intrusion Detection System (IDS) based on DynamicSource Routing (DSR) protocol is utilized. We created a Black-hole node to conduct malicious activities in thenetwork. The IDSAODV and IDSDSR are analyzed for different Quality of Service (QoS) characteristics suchas Packet Delivery Ratio (PDR), Throughput, Energy Consumption, and delay in a network size of 10 nodesfor simulation period of 100 seconds. The NetSim tool was utilized as a simulation tool for creating networkwith malicious node and to implement IDS. The results demonstrate that the IDSAODV and IDSDSR efficientlyidentify and prevent a BH attack on the network. The IDSAODV improves PDR and throughput while consumingmore energy and having a little higher delay

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here