A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Similar documents
A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

International Journal of Advance Research in Computer Science and Management Studies

Wormhole Attack in Wireless Ad-Hoc Networks

Defenses against Wormhole Attack

A Study on Issues Associated with Mobile Network

LERP: A Secure Location Based Efficient Routing Protocol

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Detection and Prevention of Wormhole Attack in Wireless Sensor Network

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Wormhole Detection and Prevention in MANET: A Review

A Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks

Link-Based Wormhole Detection in Wireless Sensor Networks

Security Issues In Mobile Ad hoc Network Routing Protocols

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

A Review On: Detection and Prevention of Wormhole Attacks in MANET

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Detection of Wormhole Attacks in Wireless Sensor Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

An Improvement to Mobile Network using Data Mining Approach

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

A REVIEW: ANALYSIS OF WORMHOLE ATTACK AND ITS DETECTION TECHNIQUES

International Journal of Advance Research in Engineering, Science & Technology. A Survey on Wormhole Attack in MANET

Immuning Routing Protocols from the Wormhole Attack

Review Paper on Wormhole Attack

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

International Journal of Advance Engineering and Research Development

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Round Trip Time based Wormhole Attacks Detection

A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM

II. ROUTING CATEGORIES

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Simulation of Intrusion Prevention System

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Physical and Communication Parameter Based Vertical Handover in Hybrid Vehicular Network

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Mobile Agent Driven Time Synchronized Energy Efficient WSN

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

A Secure Routing Protocol for Wireless Adhoc Network Creation

Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Wormhole Attack Detection Protocol using Time Stamp with Security Packet.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

High Efficient Broadcasting Protocols for Mobile ADHOC Network

Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Webpage: Volume 4, Issue VI, June 2016 ISSN

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Routing Protocols in MANET: Comparative Study

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Packet Estimation with CBDS Approach to secure MANET

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Cross Layer Detection of Wormhole In MANET Using FIS

WSEAS TRANSACTIONS on COMPUTERS

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach

hash chains to provide efficient secure solutions for DSDV [7].

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

An Analysis and Prevention of Routing Attacks in Mobile Adhoc Networks

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Review Paper on Secure Routing Technique for MANETs

Introduction and Statement of the Problem

Performance Evaluation of Various Routing Protocols in MANET

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Rumor Routing Algorithm

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

A Survey of Attacks in Mobile Ad Hoc Network

Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks

Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Ad-hoc Network

Figure 1: Ad-Hoc routing protocols.

A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Performance Analysis of AODV, DSDV and DSR by using Different Mobility Models

Transcription:

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029 1034 RESEARCH ARTICLE ISSN 2320 088X A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Savita Student, M.Tech (ECE), South Point Institute of Technology & Management E.mail: savitasaini7474@gmail.com Amit Kumar HOD, ECE Dept, South Point Institute of Technology & Management E.mail: amitkumardcr@gmail.com Abstract Security is most critical issue aspects for Delay Tolerant Network. A network in public domain suffers from various internal and external attacks. These attacks also slow down the network and affects the reliability of network. In this present work, a priority adaptive message scheduling model is presented to optimize the communication. In this model, the pigeon agents are distributed over the network to identify the node priority so that the communication will be performed over the high priority nodes. The communication parameters such as lossrate and delay based analysis on node prioritization is done in this work. The simulation results shows that the presented work has reduced the communication delay and improved the communication throughput. Keywords Delay Tolerant Network, Security, Parameter Based I. INTRODUCTION Delay Tolerant Network is the network defined in public domain which provides the long distance cooperative communication. It is the most common form of adhoc network in which the communication without the specification of any infrastructure. This network for is defined with specification of relative problem so that the adaptive communication is obtained from the work. The protocol is also defined with specification of the communication parameter, architecture adaptive utilization and the route formation. The network suffers from various issues shown in the network. The first and foremost challenge to the network is the its mobility. The mobiles nodes at different speed increase the interruption during the communication so that the communication loss is expected. The speed in these networks is generally not directed. It means node can randomly move in any direction so that the analysis over the network can be performed based on different parameter. This kind of parameter based analysis can be applied to provide the safe communication in the network. This network form provides the safe communication. The dynamic nature of this network and the frequent change is architectural or the node position increase the communication criticality. The network also allows the inclusion and exclusion of nodes in the network. This movement based dynamic nature also switch between different coverage areas so that the switching to the 2015, IJCSMC All Rights Reserved 1029

base station also a criticality of the network model This kind of vehicle switch increases the network deficiencies and the network criticality is also increased. These all issues to the network are based on the communication aspect. Another critical issue in Delay Tolerant Network is the security. Speed Direction Load DELAY TOLERANT NETWORK Challenges Lack of Infrastructur e Authentication Security Figure 1 : Delay Tolerant Network Issues The security in a public network is considered as the most critical communication issue. The security threats affects the network at different levels and in different layers. These security threats can be generated by internal as well as external network nodes. The security threats can be node specific, application specification or the communication specific. There are number of associated issues collected to provide the reliable communication to optimize the communication. These network solutions include the authentication adaptive security, preventive security and the attack specific security. The authentication is some kind of verification of a node under reliability vector. A node which is more stable and reliable is considered as adaptive for mobile communication. Another method for reliable communication and the communication aspect based optimization can be achieved using preventive approach. To provide the safe communication over the network, the preventive communication can be performed over the network. The final work associated with this research is the attack specific security. Network suffers from various internal and external attacks. These attacks affect the network in different ways. The attack constraint specific model can be applied to identify the attacked nodes and block the communication over these nodes. In this paper, one of such attack affected problem can be resolved. In this paper, the work is defined for wormhole attack detection and providing the safe communication over the network. In this paper, a safe communication model is presented to optimize the communication in Delay Tolerant Network. The presented work model is defined based on pigeon adaptive communication analysis model. In this section, an exploration on Delay Tolerant Network issues is defined. The section also identified the security issues over the network. In section II, the work defined by earlier researchers is discussed. In section III, the presented research work is defined. In section IV, the results obtained from work are presented. In section V, the conclusion of the work is defined. II. EXISTING WORK In this section the work defined by earlier research is discussed and presented. Capkum[1] has presented a sector adaptive node synchronization model for attack detection. Author analyzed the distance bounding based analysis with authentication measure for estimation of the reliable communicating node. Author defined the time bound adaptive analysis applied to analyze the cooperative neighbor. Once the neighbor is identified, the attack specific modeling is applied for attack detection in the network. Leash[2] also presented a study on the wormhole attack and its defensive measures. Author defined the packet design based transmission control mechanism under distance analysis. Author presented two main model for analysis called temporal and geographical model. The temporal model where analyzed the time bound synchronization over the communication and the geographic model analyzed the communication under positional aspects. The position and transition based analysis has provided the safe and adaptive communication in network. Author[3] defined directional antenna based modeling for optimizing the communication under cluster adaptive analysis. Author provided the message communication for wormhole discovery and provided the exclusive communication mechanism in the network. Author presented the trust adaptive communication route generation model to optimize the network communication. Chiu[4[ proposed a hop analysis model identification of the load and delay on each communicating neighbor. Author defined the propagation analysis based hop adaptive path diversity modeling so that the adaptive communication mechanism will be 2015, IJCSMC All Rights Reserved 1030

formed over the network. This network model is defined for optimizing the network communication and provided the secure communication over the network. Author[5] defined the wormhole attack in reference to the Delay Tolerant Network protocols and conclude the illusion in the remote regions so that the throughput adaptive neighbor node communication will be formed. Author provided the directly connected network model for optimizing the communication and provided the communication in attack network. Author optimized the network security under speed off link. Author[6] Also identify the channel band observation to optimize the network communication under delay analysis. Author defined a tunnel preventive model to optimize the communication and to generate the safer and shorter path. Author also minimizes the visit over any of the tunnel node based on the memory adaptive recording. Author[7] has defined a route formation based model to analyze the communication hop count so that the reliable communication route will be formed over the network. This network model assigned the priority to the routing nodes and provided the solution under eavesdropping, packet modification and DOS attack. Author provided the routing solution against wormhole attack. Author[8] generated a hop driven communication analysis model for effective communication formation in the Delay Tolerant Network. Author provided the wormhole detection under two step analysis. This analysis is provided on the path length and provides the analysis on advertised path. Author defined the route information collection model so that the timestamp based communication will be formed. The consecutive formation and threshold specific communication will be formed. Gorlatva[9] defined a work on the wormhole attack identification technique for attack identification. Author defined the time interval based control message generation for optimized link identification. The range specific analysis is here applied for optimizing the network communication in the network. Shalini[10] also proposed the trustable scheme for isolating node analysis for wormhole attack identification. Author defined the cryptographic model for malicious node identification and colluding node specification in the network. the operational activity is observed to generate the path. Author[11] defined an optimization to the AODV protocol against the wormhole attack and provided the communication solution under evaluation test. Author defined the statistical measure based model for route optimization and route generation under the aspect derivation. This model has analyzed the Request time for the optimization of communication over the network. III. PROPOSED MODEL Delay Tolerant network are the improved form of network that reduces the end to end delay by generating the end to end routing path. These kind of network can be applied in critical application areas such as military or war mobile networks. According to this approach, each node is defined with specific messenger called pigeon. These pigeon will use the message prioritization based scheduling approach to deliver the messages to multiple nodes. The presented work is the improvement to this existing scheduling approach. According to this approach, instead of defining pigeon for each node, complete network will be defined in groups. Each group will contain a set of nodes with specification of coordinator node. This coordinator node will be the pigeon node. According to the type of messages, the number of pigeons will be decided. High priority pigeons will be transmitted without delay whereas the low priority pigeons will store the message in available buffer. In second stage, these pigeon will schedule the destination nodes based on message priority. Based on this message analysis and network statistics analysis, the aggregative schedule over the network nodes will be generated. This aggregative schedule will be defined as the sequence path to deliver the messages. The presented work is defined to improve the delay tolerant network by defining a prioritization based scheduling mechanism for segmented network. According to this network, instead of defining the pigeon for each node, complete network will be divided in several segments. Each segment will be controlled by a coordinator node and the message pigeon management will be done by this coordinator node. The algorithmic approach will be defined for this segment generation and the coordinator node selection over the network. Once the coordinators will be identified, the next work will be to identify the message types and based on which the prioritized secluding will be done under following specifications. No delay for critical messages Buffering for low priority messages Optimized network path will be generated based on the message priority and the network statistics analysis In this work, the agents are distributed over the network to provide the communication optimization so that the adaptive communication over the network will be formed. This network model is defined to achieve the node level prioritization so that the safe communication will be formed over the network. The work is about to reduce the packet confliction so that the safe and reliable communication will be obtained from the work. The proposed work model is shown in figure 2. 2015, IJCSMC All Rights Reserved 1031

Generate Mobile Network with N Nodes Set source and destination Nodes Perform Node level analysis under defined parameters Generate the node weights for effective neighbor identification Perform next hop selection from current node If high weight neighbor is identified, select it as next hop If it is low weight perform the route check to generate reliable node Repeat the process till destination node not occur Figure 2 : Proposed Work Model IV. RESULTS In this present work, parameter adaptive communication model is presented for safe communication in delay tolerant network. The work is here defined based on the communication parameters. In first level the neighbor node analysis is done and later on the communication analysis based safe path is obtained. The work is implemented in NS2 network. The simulation parameters considered in this work are shown in figure 1 Table 1 : Simulation Parameters Parameter Value Number of Nodes 30 Position Simulation Time Random 100sec 2015, IJCSMC All Rights Reserved 1032

Network Area 100x 100 Data Rate 10.2e6 Bandwidth 20.0e6 Propagation model Antenna Model MS Speed Two ray ground Omni directional Random Figure 3 : Packet Communication Analysis Figure 3 is showing the comparative analysis of this work in terms of packet communication. The figure shows that the presented work model has improved the network communication and network throughput. The work has improved the network effectiveness and provided the reliable communication over the network. Figure 4 : Communication Delay Analysis 2015, IJCSMC All Rights Reserved 1033

Figure 4 is showing the comparative analysis of this work in terms of packet delay. The figure shows that the presented work model has reduced the network delay so that the reliability of the work is improved V. CONCLUSION In this paper and adaptive communication model is defined for optimizing the Delay Tolerant Network. The presented model has provided the optimized parameter adaptive communication. The pigeon adaptive agent based model is presented to optimize the communication over the network. Results shows that the work has improved the communication throughput and reduced the loss. REFERENCES [1] 1. Srdjan Capkun, L.evente Buttyan, and Jean-Pierre Hubaux, 2003 SECTOR: Secure Traking of Node Encouters in Multi-hop Wireless Networks, In Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks (ACM SANS), pp. 21-32. [2] 2. Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 Packet Leashes : A Defence against Wormhole Attacks in Wireless Networks, Twenty-Second ANNUAL Joint Conference of IEEE Computer and Communications, pp. 267-279. [3] 3. Lingxuan Hu and David Evans, Feb. 2004 Using Directional Antennas to Prevent Wormhole Attack,In Proceedings of the Network and Distributed System Security Symposium, pp. 131-141. [4] 4. Chiu, HS; Wong Lui KS, 2006 DELPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks,In Proceeding of International Symposium on Wireless Pervasive Computing, pp. 6-11. [5] 5. Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, Nov. 2008 Analysis of wormhole Intrusion Attacks In Delay Tolerant NetworkS,IEEE Military Communications Conference,MILCOM 2008. [6] 6. Y.-C. Hu, A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, Security and Privecy Magazine, IEEE, vol. 2, issue 3,pp. 28-39, May 2004. [7] 7. R. S. Khainwar, A. Jain, J. P. Tyagi, Dec 2011, Elimination of Wormhole Attacker Node in Delay Tolerant Network Using Performance Evaluation Multipath Algorithm International Journal of Egineering Technology and Advanced Engineering, Volume 1, Issue 2, pp. 40-47. [8] 8. F. Natt-Abdesselam, B. Bensaou, T. Taleb, Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Network, IEEE Communications Magazine, 46(4), pp. 127-133, 2008. [9] 9. M.A. Gorlatva, P. C. Mason, M. Wang, L. Lamont, R. Liscano, Detecting Wormhole attacks in Mobile A d Hoc Networks through Protocol Breaking and Packet Timing Analysis, In IEEE Military Communications Conference, pp. 1-7,2000 [10] 10. Shalini Jain, Dr.Satbir Jain, Detection and prevention of wormhole attack in mobile adhoc networks, In Proceedings of the International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010, pp.78-86. [11] 11. Stallings W [2000], Network Security Essentials: Security Attacks. Prentice Hall. pp. 2-17. 2015, IJCSMC All Rights Reserved 1034