Associate Professor, Department of Assistant Professor, Department of Assistant Professor, Department of Computer Science and Engineering Computer Science and Engineering Computer Science and Engineering SNS College of Engineering SNS College of Engineering Karpagam Academy of Higher Coimbatore, India Coimbatore, India Education jebakumarimmanuel@gmail.com prakash.ep@gmail.com Coimbatore, India dhanapalramasamy.p@gmail.com Aby K Thomas K.Karthikeyan Professor, Department of Electronics Assistant Professor, Department of P.Poovizhi and Communication Engineering Computer Science and Engineering Assistant Professor, Department of Alliance College of Engineering and SNS College of Engineering Information Technology, Dr.N.G.P. Design, Alliance University Coimbatore, India Institute of Technology, Coimbatore, Bangalore, India sns.cse.karthik@gmail.com India aby.thomas@alliance.edu.in poovizhiponnusamyit@gmail.com
Abstract— The detection and maintenance of the pathway
from the source to the destination or from one node to another node is the major role played by the nodes in the MANET. During their period, nodes arrive or leave the network, and endlessly modify their comparative location. The dynamic nature introduces several security issues. Secure routing protocol is a significant area for attaining better security in the network by keeping the routing protocols against attacks. Thus, this research work focuses on developing a secure routing protocol for MAN ET. Here, a dynamic anomaly detection scheme has proposed to detect against malicious attacks in the network. This scheme has been incorporated with AODV protocol to enhance the performance of AODV in disseminating packets to target node. In this research work Protected AODV (PAODV) is protocol is introduced to identify Fig 1: Application of MANET the false alarm node in the network and route path for reliable communication between the source to destination. Simulation The vertex p resent in the system is genuine and results it shows the detection rate, Packet drop rate and delay cooperative with others are the assumptions for the routing is minimized compare to the existing technique. protocol. The malicious nodes may enter into the network Keywords— MANET, Attacks, AODV, Flooding, Security, which affects the normal operation of the entire network. Network lifetime, Detection Probability, False alarm. These nodes act like normal nodes and violates the protocol specifications. Because of the nature of dynamic, the nodes I. INT RODUCT ION will enter into the network as malicious node [3][4][5]. A group of mobile vert ices which uses wireless network Thus, the key aspect of this article is to address this issue, to link with each other without any pre-defined static thereby enhancing the performance of AODV protocol. infrastructure is termed as MANET [1][2]. Fig 1 shows a Here the abnormal nodes are detected and the insertion of typical architecture of a MANET. The vertices are mobile in malicious nodes are avoided. The traffic pattern is nature, such a network and each node in the system plays a considered for the anomaly detection scheme to detect the two-fold role: end-point of a message session and in-between malicious node. router. During their period, nodes go in or leave the system, The research article is organized in the succeeding way. and endlessly modify their comparative location. The first segment describes the introduction of the MANET. The second section deals with the works related to this research article. Here, the AODV protocols are described. The third section exp lains the ano maly detection schemes for dynamic way. The detection of the network traffic is explained in the fourth section. The last section describes the results and discussion of the imp lementation. At last, the conclusion is described.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SRINAGAR. Downloaded on April 28,2022 at 07:23:05 UTC from IEEE Xplore. Restrictions apply.
Understanding of Incipient Discharges in Transformer Insulation by Reconstruction of Digital Twins For The Discharges Using Generative Adversarial Networks