Smart Strategies for Energy-Aware Rouge Node Detection in Mobile Ad-hoc Networks | IEEE Conference Publication | IEEE Xplore

Smart Strategies for Energy-Aware Rouge Node Detection in Mobile Ad-hoc Networks


Abstract:

Given the exponential growth in interest, vehicle ad-hoc networks, or VANETs, have received considerable attention. Because there is no infrastructure or central monitori...Show More

Abstract:

Given the exponential growth in interest, vehicle ad-hoc networks, or VANETs, have received considerable attention. Because there is no infrastructure or central monitoring body, the nodes self-organize. Routing and data transmission are carried out collaboratively by the nodes. “Currently, they are extensively utilized across various sectors, including disaster management, context-aware computing, business partnerships, military operations, and emergency response coordination following a fire. Consequently, security emerges as a paramount concern and necessity. This paper delves into ad-hoc networks, aiming to uncover malicious nodes within the network. Within the vast array of VANET classifications, this study predominantly focuses on a multi-parameter optimized approach for identifying and isolating rogue nodes in vehicular networks. An approach to trust optimization has been devised, integrating factors such as energy consumption, average velocity, message traffic, end-to-end latency, packet loss, and throughput. The proposed optimization strategy surpasses previous studies in terms of effectiveness, achieving an efficiency rate of 90% in handling rogue nodes.
Date of Conference: 15-16 March 2024
Date Added to IEEE Xplore: 08 May 2024
ISBN Information:
Conference Location: Bengaluru, India
References is not available for this document.

I. Introduction

VANET is a word that refers to vehicle nodes that are not connected by wires, i.e. are wireless, resulting in a transitory network that does not require the assistance of a fixed central administering agent. Nodes connect directly with other entities for any necessity of communicating purpose that is within their transmission range [12]. Outside of their transmission range, nodes can still communicate, and this way of communication is accomplished through multi-hop scenario transfer to nodes that are not in their transmission range. Essentially, multi-hop transmission is defined as a packet that, after being sent across intermediate nodes of the network engaging in data flow, arrives at the end or destination node using any of the routing strategies in use [10]. Cooperation is essential among these data exchange nodes, since it leads to successful information reception all the way to the end or destination. Cooperation is a term used here to describe the group performance of network configuration functions by nodes. The converse can waste a lot of energy and resources while not producing the desired results [24].

Select All
1.
Azzedine Boukerche et al., "Routing protocols in ad hoc networks: A survey", Computer networks, vol. 55, no. 13, pp. 3032-3080, 2011.
2.
Ali Dorri, Seyed Reza Kamel and Esmaeil Kheirkhah, Security challenges in mobile ad hoc networks: A survey, 2015.
3.
Rutvij H. WormholeJhaveri et al., "MANET routing protocols and wormhole attack against AODV", International Journal of Computer Science and Network Security, vol. 10, pp. 12-18, 2010.
4.
Joseph Soryal and Tarek Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET", Wireless Telecommunications Symposium (WTS), 2012.
5.
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Packet drop attack detection techniques in wireless ad hoc networks: a review, 2014.
6.
S. Marti, T.J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255-265, 2000,August.
7.
X. Li, R. Lu, X. Liang and X. Shen, "Side channel monitoring: Packet drop attack detection in wireless ad hoc networks" in 2011 IEEE ICC, IEEE, pp. 1-5, 2011,June.
8.
Kashyap Balakrishnan, Jing Deng and V.K. Varshney, "TWOACK: preventing selfishness in mobile ad hoc networks", Wireless communications and networking conference 2005 IEEE. Vol., vol. 4, 2005.
9.
Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks", Wireless networks, vol. 11, no. 1-2, pp. 21-38, 2005.
10.
M.G. Rao, S. Pawar, H. Priyanka and H. kumar Reddy, "Minimize the Energy Consumption for Communication Protocol in IoT" in Energy Systems Design for Low-Power Computing, IGI Global, pp. 214-234, 2023.
11.
M.G. Rao, K.H.K. Reddy, C. Kumar, H. Priyanka and S. Pawar, "Hybrid Intelligent Fusion-Based Perspectives for WSN-IOT", 2023 NMITCON, pp. 1-7, 2023,September.
12.
M.G. Rao, H. Priyanka, A.P. Kumar and U. Divakarala, "A Deep Learning Approach Towards Building Intelligent Transport System", 2022 Second International Conference on Computer Science Engineering and Applications (ICCSEA), pp. 1-6, 2022,September.
13.
Vamshi Krishna Kapu and Ganesh Reddy Karri, Efficient Detection and Mitigation of Rushing Attacks in VANETs Using RAID: A Novel Intrusion Detection System, 2023.
14.
A.A. Aboelfottoh and M.A. Azer, "Intrusion Detection in VANETs and ACVs using Deep Learning", 20222nd International Mobile Intelligent and Ubiquitous Computing Conference (MIUCC), pp. 241-245, 2022.
15.
S. Ajjaj, S. El Houssaini, M. Hain and M.A. El Houssaini, "A new multivariate approach for real time detection of routing security attacks in VANETs", Information, vol. 13, no. 6, pp. 282, 2022.
16.
I.A. Aljabry and G.A Al-Suhail, "A survey on network simulators for vehicular ad-hoc networks (VANETS)", Int. J. Comput. Appl, vol. 174, no. 11, pp. 1-9, 2021.
17.
H. Cheng and Y. Liu, "An improved RSU-based authentication scheme for VANET", Journal of Internet Technology, vol. 21, no. 4, pp. 1137-1150, 2020.
18.
R.K. Dhanaraj, S.H. Islam and V. Rajasekar, "A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments", Wireless Networks, vol. 28, no. 7, pp. 3127-3142, 2022.
19.
C. Di and W. Wu, "A novel identity-based mutual authentication scheme for vehicle ad hoc networks", Wireless Communications and Mobile Computing, pp. 2022, 2022.
20.
A. Benmir, A. Korichi, A. Bourouis, M. Alreshoodi and L. Al-Jobouri, "An Enhanced GPSR Protocol for Vehicular Ad hoc Networks", 201911th Computer Science and Electronic Engineering (CEEC), pp. 85-89, 2019.
21.
S. Ercan, M. Ayaida and N. Messai, "Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning", IEEE Access, vol. 10, pp. 1893-1904, 2022.
22.
H. Manjula Gururaj Rao and G.S. Nagaraja, "Data Analytics Based Multimodal System for Fracture Identification and Verification in CBIR DomainIntelligent Manufacturing and Energy Sustainability" in Smart Innovation Systems and Technologies, Singapore:Springer, vol. 213, 2021.
23.
Z. Ma, J. Zhang, Y. Guo, Y. Liu, X. Liu and W. He, "An Efficient Decentralized Key Management Mechanism for VANET With Blockchain", IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 5836-5849, June 2020.
24.
M.G. Rao, P. H, V.G. A and K.H.K. Reddy, "Hybrid Technology for Multilevel Feature Extraction in CBMIR", 20237th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp. 1-6, 2023.

Contact IEEE to Subscribe

References

References is not available for this document.