You are on page 1of 1

Proceedings of the International Conference on Electronics and Renewable Systems (ICEARS 2022)

IEEE Xplore Part Number: CFP22AV8-ART; ISBN: 978-1-6654-8425-1

A Secure and Efficient Abnormality Discovery


using Cross Layer Scheme in Mobile Ad-Hoc
Network
2022 International Conference on Electronics and Renewable Systems (ICEARS) | 978-1-6654-8425-1/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICEARS53579.2022.9751992

Jebakumar Immanuel D E.P. Prakash Dhanapal R


Associate Professor, Department of Assistant Professor, Department of Assistant Professor, Department of
Computer Science and Engineering Computer Science and Engineering Computer Science and Engineering
SNS College of Engineering SNS College of Engineering Karpagam Academy of Higher
Coimbatore, India Coimbatore, India Education
jebakumarimmanuel@gmail.com prakash.ep@gmail.com Coimbatore, India
dhanapalramasamy.p@gmail.com
Aby K Thomas K.Karthikeyan
Professor, Department of Electronics Assistant Professor, Department of P.Poovizhi
and Communication Engineering Computer Science and Engineering Assistant Professor, Department of
Alliance College of Engineering and SNS College of Engineering Information Technology, Dr.N.G.P.
Design, Alliance University Coimbatore, India Institute of Technology, Coimbatore,
Bangalore, India sns.cse.karthik@gmail.com India
aby.thomas@alliance.edu.in poovizhiponnusamyit@gmail.com

Abstract— The detection and maintenance of the pathway


from the source to the destination or from one node to another
node is the major role played by the nodes in the MANET.
During their period, nodes arrive or leave the network, and
endlessly modify their comparative location. The dynamic
nature introduces several security issues. Secure routing
protocol is a significant area for attaining better security in the
network by keeping the routing protocols against attacks.
Thus, this research work focuses on developing a secure
routing protocol for MAN ET. Here, a dynamic anomaly
detection scheme has proposed to detect against malicious
attacks in the network. This scheme has been incorporated
with AODV protocol to enhance the performance of AODV in
disseminating packets to target node. In this research work
Protected AODV (PAODV) is protocol is introduced to identify
Fig 1: Application of MANET
the false alarm node in the network and route path for reliable
communication between the source to destination. Simulation The vertex p resent in the system is genuine and
results it shows the detection rate, Packet drop rate and delay cooperative with others are the assumptions for the routing
is minimized compare to the existing technique. protocol. The malicious nodes may enter into the network
Keywords— MANET, Attacks, AODV, Flooding, Security, which affects the normal operation of the entire network.
Network lifetime, Detection Probability, False alarm. These nodes act like normal nodes and violates the protocol
specifications. Because of the nature of dynamic, the nodes
I. INT RODUCT ION will enter into the network as malicious node [3][4][5].
A group of mobile vert ices which uses wireless network Thus, the key aspect of this article is to address this issue,
to link with each other without any pre-defined static thereby enhancing the performance of AODV protocol.
infrastructure is termed as MANET [1][2]. Fig 1 shows a Here the abnormal nodes are detected and the insertion of
typical architecture of a MANET. The vertices are mobile in malicious nodes are avoided. The traffic pattern is
nature, such a network and each node in the system plays a considered for the anomaly detection scheme to detect the
two-fold role: end-point of a message session and in-between malicious node.
router. During their period, nodes go in or leave the system,
The research article is organized in the succeeding way.
and endlessly modify their comparative location.
The first segment describes the introduction of the MANET.
The second section deals with the works related to this
research article. Here, the AODV protocols are described.
The third section exp lains the ano maly detection schemes
for dynamic way. The detection of the network traffic is
explained in the fourth section. The last section describes
the results and discussion of the imp lementation. At last, the
conclusion is described.

978-1-6654-8425-1/22/$31.00 ©2022 IEEE 708

Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SRINAGAR. Downloaded on April 28,2022 at 07:23:05 UTC from IEEE Xplore. Restrictions apply.

You might also like