{"title":"Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs","authors":"Sampada H. K., S. K R","doi":"10.22247/ijcna/2024/224433","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224433","url":null,"abstract":"– Mobile Ad Hoc Network (MANET) devices are powered from battery and due to infrastructure-less feature, the security and energy consumption are major concerns. Most of the researchers have assumed that the Cluster Head (CH) nodes are benign and frequently undergo cluster re-election, which shortens the network lifetime. Smart & Secure Ad Hoc On-Demand Distance Vector algorithm (S 2 -AODV) is proposed with secondary CH (S-CH), primary CH (P-CH) and a super cluster head (SCH) node along with the other nodes. Modified-AODV (M-AODV) is used for neighbor discovery. Weight-based clustering algorithm is proposed, with the primary and a secondary CH node to enhance the network efficiency. S 2 -AODV enhances security using Honey-pot AODV (H-AODV) and avoids the CH re-election process enhancing the overall network lifetime. The proposed algorithm works in off-line mode and on-line mode. In off-line mode the various Wi-Fi parameters like Received Signal Strength Indicator (RSSI), transmission power, battery level, distance and number of transmissions retries are collected from each CH node in the network. A look-up table indicating the transmission power (TXP) to be set by the CH nodes is determined by machine learning (ML) algorithms. This table is circulated among every CH node by SCH node in the network. Due to this process the intermittent reelection of the P-CH and S-CH nodes can be avoided, enhancing the network lifetime. In on-line mode, SCH executes H-AODV to identify and remove the malicious CH (black hole / gray hole) nodes (ns-2.34).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"154 S316","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140428730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Artificial Bee Colony Optimized AODV Routing Protocol (RABCO-AODV-RP) for Minimizing the Energy Consumption in Flying Ad-Hoc Network","authors":"S. Nandhini, K. S. Jeen Marseline","doi":"10.22247/ijcna/2024/224434","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224434","url":null,"abstract":"– Flying Ad-Hoc Networks (FANETs) have gained prominence in various applications, ranging from surveillance to disaster response. Their dynamic and resource-constrained nature makes efficient energy utilization a paramount concern. One significant challenge in FANETs is minimizing energy consumption, which is essential for prolonging the network lifetime and ensuring continuous operation. This paper introduces the Resilient Artificial Bee Colony Optimized AODV Routing Protocol (RABCO-AODV-RP) to address this challenge. RABCO-AODV-RP leverages the Artificial Bee Colony optimization algorithm to enhance AODV routing, optimizing route selection to minimize energy consumption while maintaining network resilience. The working mechanism of RABCO-AODV-RP encompasses two primary phases: route discovery and route maintenance. During route discovery, the protocol intelligently selects energy-efficient paths using the optimization algorithm, reducing energy waste. In the route maintenance phase, RABCO-AODV-RP continuously adapts to network dynamics, updating routes to ensure efficient and resilient communication. Extensive simulations were conducted using the NS3 network simulator to assess its performance using packet delivery ratio, packet drop ratio, throughput, end-to-end delay, energy consumption and hop count as performance metrics. The results and discussions indicate that RABCO-AODV-RP outperforms traditional AODV routing protocol. It improves packet delivery, throughput and reduces packet drop ratio, end-to-end delay and hop count. This research underscores the potential of RABCO-AODV-RP as a promising solution for extending the operational lifetime of FANETs and ensuring reliable communication in demanding environments.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"173 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140428809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling","authors":"V. M. Niaz Ahamed, K. Sivaraman","doi":"10.22247/ijcna/2024/224437","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224437","url":null,"abstract":"– Wireless communication between moving cars and stationary structures is made possible by Vehicular Ad Hoc Networks (VANETs). The goal is to communicate traffic data so that accidents can be avoided and resources can be used most effectively in current traffic conditions. There are several methods for enhancing VANETs' communicative efficacy; one is clustering in-vehicle networks. One CH assigned to each cluster and is in charge of the cluster as a whole. The CHs are responsible for all communications, both those between clusters and those within a single cluster. Vehicles in this study are organized into groups called clusters and information is relayed from one CH to another. Several different routing algorithms may be used to send data from one vehicle to another to improve the network's performance as a whole. Many reliable and safe routing systems for VANETs have been presented in the past decade. These protocols have several drawbacks, including their complexity, inability to scale to extensive networks, increased transportation costs, etc. Several bio-inspired strategies for optimal packet routing among vehicle nodes have been proposed to overcome these restrictions. Hence, this paper presents the efficient optimization of vehicular ad hoc networks assisted by a clustering nodular [EO-CN] framework to solve the abovementioned issues. The proposed method drastically reduced network overhead in settings with varying densities of nodes. Numerous experiments were conducted with various parameters, including cluster size, network area, node density, and transmission distance. These findings demonstrated that [EO-CN] performed better than competing approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization and Deployment Considerations into Quality of Service Optimization for Energy-Efficient Wireless Sensor Networks","authors":"Jeya Rani D., Nagarajan Munusamy","doi":"10.22247/ijcna/2024/224438","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224438","url":null,"abstract":"– Wireless Sensor Networks (WSNs) have been more popular for a wide range of applications due to research ability to monitor and gather data from a variety of situations. However, it remains challenging to achieve Quality of Service (QoS) while maintaining energy efficiency. In the context of QoS optimization for energy-efficient WSNs, this study investigates the crucial issues of localization and deployment concerns. Localization the precise positions of sensor nodes are crucial for effective data fusion and routing algorithms that rely on localization. This study compares and contrasts several localization methods, including range-based and range-free approaches, and explains benefits and drawbacks. The study also investigates the effects on QoS and energy savings of various deployment strategies, including optimizing node location, boosting coverage, and increasing node density. The goal of this research is to find out how to optimize QoS in low-power wireless networks by including latency, throughput, and stability, among other quality of service characteristics, into the design of routing algorithms. Current routing protocols, like Low-Energy Adaptive Clustering Hierarchy (LEACH), are assessed for ability to optimize quality of service while minimizing energy consumption. In addition, this study explores several approaches that might help enhance QoS while reducing energy consumption, such as energy-aware routing, adaptive duty cycling, and data aggregation methods. By thoroughly examining and evaluating localization algorithms, deployment concerns, and routing protocols, this study offers practical and theoretical insights for researchers and practitioners aiming to optimize quality of service in energy-efficient WSNs. Useful and dependable WSN deployments in a wide variety of domains possible with the help of the presented results and suggestions.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"37 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140431696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aristide Ndayikengurukiye, Abderrahmane Ez-Zahout, F. Omary
{"title":"Optimizing Virtual Machines Placement in a Heterogeneous Cloud Data Center System","authors":"Aristide Ndayikengurukiye, Abderrahmane Ez-Zahout, F. Omary","doi":"10.22247/ijcna/2024/224431","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224431","url":null,"abstract":"– In a cloud computing environment, good resource management remains a major challenge for its good operation. Implementing virtual machine placement (VMP) on physical machines helps to achieve various objectives, such as resource allocation, load balancing, energy consumption, and quality of service. VMP (virtual machine placement) in the cloud is critical, so it's important to audit its implementation. It must take into account the resources of the physical server, including CPU, RAM, and storage. In this paper, a metaheuristic algorithm based on the Grey Wolf Optimization (GWO) method is used to optimize the placement of virtual machines in a cloud environment, effectively minimizing the number of active virtual machines used to host virtual servers. Experimental results demonstrate the effectiveness of the proposed method, called Grey Wolf Optimization for Virtual Machine Placement (GWOVMP). The method reduces power consumption by 20.99 and resource wastage by 1.80 compared with existing algorithms.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"50 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140431349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol","authors":"J. A. Rathod, Manjunath Kotari","doi":"10.22247/ijcna/2024/224436","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224436","url":null,"abstract":"– Several practical applications are combined in a new paradigm known as 5G-based mobile ad hoc networks (MANET) with cloud. Numerous existing works perform trust assessment, intrusion detection, and route discovery to improve secure data transmission in MANET. Route maintenance was not carried out in several of the existing works, and the absence of enumerating link status and node reliability during route maintenance results in link failure and increases packet loss. By considering the existing issues, a novel Kangaroo-based intrusion detection system was proposed to eliminate malicious nodes from the network using Bidirectional-Long Short-Term Memory (Bi-LSTM). This increases data transmission security. For graphical user authentication, encryption based on ASCII values of the Reflection tree (E-ART algorithm) is employed. In this paper, a divide well merge algorithm was implemented, which is a better approach for hierarchical clustering. This method consists of two phases: a Division and Merging phase. The effective route identification and route maintenance in MANET are implemented by using an Advanced Ad-hoc On-demand Distance Vector Protocol (Advanced AODV), which discovers the route using the Fire Hawk Optimization Algorithm (FHO) to obtain optimal multipath by contemplating trust, node connectivity, throughput, node degree, bandwidth, energy and distance where this protocol offers loop-free operation and enhance its scalability to numerous numbers of terminals. In this way, route discovery and route maintenance are established to enhance secure data transmission, thereby reducing packet loss. The modified blockchain called TriChain is proposed for enhancing data transmission security. For the Proof of Work based on Reputation (PoWR) consensus algorithm is used to reduce transaction confirmation latency and block creation time thereby increasing security. In this way, route discovery and route maintenance are established to enhance secure data transmission thereby reducing packet loss. The proposed work is evaluated using detection rate, energy consumption, packet delivery rate, throughput, authentication rate and delay.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"42 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expedient Intrusion Detection System in MANET Using Robust Dragonfly-Optimized Enhanced Naive Bayes (RDO-ENB)","authors":"M. Sasikumar, K. Rohini","doi":"10.22247/ijcna/2024/224435","DOIUrl":"https://doi.org/10.22247/ijcna/2024/224435","url":null,"abstract":"– Mobile Ad hoc networks (MANETs) represent dynamic, self-configuring network environments that provide flexible connectivity but are highly susceptible to security threats. Intrusion detection systems in MANETs need to continuously monitor network traffic for potential intrusions and anomalies. This constant monitoring can be energy-intensive, requiring network nodes to process, analyze, and transmit data. Excessive energy consumption by IDS can deplete node batteries quickly, leading to network disruptions. This research focuses on developing and evaluating an efficient IDS proposed for MANETs called Robust Dragonfly-Optimized Naive Bayes (RDO-ENB). RDO-ENB operates by fusing the simplicity and efficiency of the Enhanced Naive Bayes algorithm with the adaptive capabilities of robust Dragonfly Optimization. This synergy enables RDO-ENB to continuously and dynamically adjust its internal parameters, optimizing its intrusion detection performance in real time. It enhances accuracy and reduces false positives, making it proficient in identifying and mitigating intrusions within the complex and ever-evolving environment of MANETs. The dataset employed for evaluation is NSL-KDD, a widely used dataset for intrusion detection. The results of the IDS implementation demonstrate its proficiency in accurately identifying and mitigating intrusions while minimizing false positives and conserving valuable energy resources.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"23 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANFIS-RSOA Approach for Detecting and Preventing Network Layer Attacks in MANET","authors":"S. N, Rajesh. A, K. S. Archana","doi":"10.22247/ijcna/2023/223693","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223693","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" 36","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139140030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Omar M. Mohamed, Tarek M. Mahmoud, Abdelmgeid A. Ali
{"title":"Assessing a Real-time Adaptive Traffic Route Based on Ranking Software Defined Networking (SDN) Cluster of Controllers in a Datacenter","authors":"Omar M. Mohamed, Tarek M. Mahmoud, Abdelmgeid A. Ali","doi":"10.22247/ijcna/2023/223684","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223684","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}