IJETMS LANDING PAGE

International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 1

A Study on Detect and Prevent Network strike in MANETS

AUTHOR(S)

Dr. Bhasker Gangadhar Koshidgewar

DOI: https://doi.org/10.46647/ijetms.2023.v07i01.053

ABSTRACT
The greatest challenge for the MANETS is to come with a robust security solution even in the presence of malicious nodes, so that MANET can be protected from various routing strikes. Several countermeasures have been proposed for these routing strikes in MANETS using various cryptographic techniques. But most of these mechanisms are not considerably suitable for the resource constraints, i.e., bandwidth limitation and battery power, since they results in heavy traffic load for exchanging and verification of keys. In this paper, a new semantic security solution is provided, which suits for the different MANET constraints and also is robust in nature, since it is able to identify and prevent four routing strikes parallel.

Page No: 350 - 355

References:

[1] Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Strikes in Mobile Ad hoc Networks”. Inte. Journal of Computer Science and Security, 2(3):18-29, 2008
[2] Bingwen He, Joakim Hägglund and Qing Gu. “Security in Adhoc Networks”, An essay produced for the course Secure Computer Systems HT2005  2005
[3] IEEE Std. 802.11. “Wireless LAN Medium Access Control (MAC) and Physical Layer  Specifications”, 1997
[4] Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung. “WAP: Wormhole Strike Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008
[5] Moumita Deb, “A Cooperative Black hole Node Detection Mechanism for ADHOC Networks”, Proceedings of the World Congress on Engineering and Computer Science, 2008
[6] Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal and Ajith
Abraham. “A Distributed Security Scheme for Ad Hoc Networks”, ACM Publications, Vol-11, Issue 1, pp.5–5, 2004
[7] Ms. Shalika; Mr. Veepin Kumar. "Enriching and Clustering Short Text Using KNN". International Research Journal on Advanced Science Hub, 3, Special Issue 7S, 2021, 111-116. doi: 10.47392/irjash.2021.219
[8] Suraj S. Bhoite; Swapnali K. Londhe. "Aspect Based Online Sentiment Analysis Product Review and Feature Using Machine Learning". International Research Journal on Advanced Science Hub, 3, Special Issue 7S, 2021, 54-59. doi: 10.47392/irjash.2021.209
[9] Sri Vigna Hema V; Devadharshini S; Gowsalya P. "Malicious Traffic Flow Detection in IOT Using Ml Based Algorithms". International Research Journal on Advanced Science Hub, 3, Special Issue ICITCA-2021 5S, 2021, 68-76. doi: 10.47392/irjash.2021.142
[10] Ravindra Parab; Pawan Pandey. "Design of Real-Time Multi-Level Inverter with Remote Monitoring System". International Research Journal on Advanced Science Hub, 3, Special Issue 6S, 2021, 6-10. doi: 10.47392/irjash.2021.157
[11] Mohammed Fasiuddin; Anupama A Deshpande; Mahabood Shaik. "Strengthening WSN Applications in Oil and Gas Industries for Multiple Monitoring Frameworks". International Research Journal on Advanced Science Hub, 2, 6, 2020, 150-153. doi: 10.47392/irjash.2020.54
[12] R. Devi Priya, R. Sivaraj, Ajith Abraham, T. Pravin, P. Sivasankar and N. Anitha, "Multi-Objective Particle Swarm Optimization Based Preprocessing of Multi-Class Extremely Imbalanced Datasets", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 30, No. 05, pp. 735-755 (2022), doi: 10.1142/S0218488522500209
[13] Deshmukh K P. "Wireless Transceiver Module HC-12 based Automatic Water-level Monitoring and Control System". International Research Journal on Advanced Science Hub, 2, 10, 2020, 24-28. doi: 10.47392/irjash.2020.184

How to Cite This Article:
Dr. Bhasker Gangadhar Koshidgewar . A Study on Detect and Prevent Network strike in MANETS . ijetms;7(1):350-355. DOI: 10.46647/ijetms.2023.v07i01.053