Security in wireless ad hoc network
by Sachin D. Ubarhande; Dharmpal D. Doye; Prakash S. Nalwade
International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 2, 2017

Abstract: The mobile ad hoc network is open medium, easy to deploy and free of the centralised control network. But these features of mobile ad hoc network come along with security attacks, such as black hole attack and grey hole attack. In black hole attack malicious node degrades security and performance of network. This paper proposes a dual identity-based intrusion detection system to improve security and performance of mobile ad hoc network. The proposed system works based on the head node identities, namely, base and virtual. The head node uses the virtual identity to detect the malicious nodes and serves source node to establish a secure path to destination node. The simulation conducted using the network simulator revealed that proposed system improves the performance of the network for packet delivery ratio by 5%, throughput by 43%, packet loss rate by 57% and routing overhead by 13% as compared to another system.

Online publication date: Sun, 16-Jul-2017

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Protocol Technology (IJIPT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com