Security in wireless ad hoc network Online publication date: Sun, 16-Jul-2017
by Sachin D. Ubarhande; Dharmpal D. Doye; Prakash S. Nalwade
International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 2, 2017
Abstract: The mobile ad hoc network is open medium, easy to deploy and free of the centralised control network. But these features of mobile ad hoc network come along with security attacks, such as black hole attack and grey hole attack. In black hole attack malicious node degrades security and performance of network. This paper proposes a dual identity-based intrusion detection system to improve security and performance of mobile ad hoc network. The proposed system works based on the head node identities, namely, base and virtual. The head node uses the virtual identity to detect the malicious nodes and serves source node to establish a secure path to destination node. The simulation conducted using the network simulator revealed that proposed system improves the performance of the network for packet delivery ratio by 5%, throughput by 43%, packet loss rate by 57% and routing overhead by 13% as compared to another system.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Protocol Technology (IJIPT):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com