Enhance Identification And Removal of Threats By Misbehaving Nodes And Optimizing
#1

Submitted By
Mr. Bhushan M. Manjre

[attachment=12076]
Enhance Identification And Removal of Threats By Misbehaving Nodes And Optimizing Network Performance In MANET.
Introduction

• Mobile Ad hoc Network (MANET) : Wireless multi hop temporary infrastructure less network.
• Co-operative Multi hop Forwarding Capability of MANET.
• Node Misbehavior and Misbehavior Threat.
• Denial of Service : Consequence of Node Misbehavior on MANET.
Objective
• The objective is to develop an approach that will facilitate the detection of such misbehaving MANET nodes, removing the threats imposed by them so as to prevent them from harming network operation and thus optimizing the network performance in MANET.
Proposed Work
• In MANET, Ad-hoc On-Demand Multi path Distance Vector Routing (AOMDV) is reactive routing protocol, uses multiple paths between source and destination.
• AOMDV, being multi path routing protocol, has more message overhead during route discovery and load balancing and hence traffic load increases, which consume both channel bandwidth as well as the battery power of nodes for communication /processing.
• This increased traffic load consumes more CPU cycles, battery and other resources of node which leads to increased misbehaving tendency of node.
• The proposed work is divided into 3 modules. Module 1 will comprise of detection of misbehaving nodes in AOMDV protocol. Module 2 will remove the threats imposed by misbehaving nodes. Module 3 will be dedicated to optimization of network performance.
• Module 1 : Detection of Misbehaving Nodes.
– Route Discovery for Node-Disjoint Path Set.
– Two types of Control Packets : TPI Packet and PFI Packets.
– TPI Packet – Source ID, Destination ID, Total number of Data transmission path information, including the path length and nodes along the path, Timeout value,.
– PFI Packet – Alert Identifier and Failure path lengths and nodes along them.
– Destination Path Table :
• Module 1 : Continued...
– Broadcast TPI packets.
– Destination checks for missing control packets and their paths.
– Sends PFI packet back to source containing the information of failure paths.
– Source will avoid failure paths and triggers Watchdog over failure paths.
– Watchdog will point out packet dropper node and will inform source.
– Source will remove failure path informed by PFI packet, from route cache.
• Module 2 : Removal of Misbehaving Nodes.
– Source maintains black list of misbehaving nodes and will excludes those in next route discovery.
– Data packets are encrypted with AES and are transmitted.
– If node in reliable path starts misbehaving then source won’t be getting its ACK within RTO.
– Here source will checks its RT table, points outs missing packet path and triggers watchdog over it.
– The missing packet is sent over another reliable path.
• Module 3 : Network Optimization
– Avoidance of False Detection: Due to congestion, transmitted power level, collision, buffer overflow.
– Avoidance of Reliability index mechanism : Computational complexity, takes processing power, induces delay.
– Redundancy Avoidance : Only sending missing packets, reducing flooding thus avoiding congestion.
– Promiscuous overhearing and reputation based system avoidance : Robustness increases.
Current Implementation Status
• Building Root Cache.
• Dispersion of TPI and PFI Control Packets.
• Detection and Avoidance of Misbehaving Nodes by Removing Failure Paths Reported by PFI Control Packets.
• Abrupt Misbehavior by Any Node in Middle of Communication is Tackled.
• Comparison with AOMDV Protocol in terms of End to End Delay and Total Throughput.
Simulation Snapshots
• Dispersing of TPI Packets between Source Node 6 and Destination Node 5…
• Node 1 is dropping packets..
• Node 0 is also dropping packets…
• Both Nodes i.e. Node 1 and Node 0 are packet Droppers..
• Hence both are avoided and data transmission continues..
Simulation Results
• Comparison of Delay Between Proposed Approach and AOMDV
• Comparison of Throughput Between Proposed Approach and AOMDV
Part that yet to be implemented
• To prevent blacklisted misbehaving nodes from taking part in next route discovery.
• The encryption and decryption of data packets so as to address packet altering misbehavior.
• Final graphs of Delay and Throughput.
Conclusion
• With the proposed work, the delay in AOMDV is getting reduced approximately by 50%.
• The total throughput is increased by 45% approx.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: threats of hemp and hpm seminar report, reliable array of independent nodes technology ppt free download, drawbacks of aomdv, malicious nodes which disrupts the transmission to avoid, magnetically controlled reactors enhance transmission capability and save energy with doc, semiconductor technology nodes, online restaurant project future enhance,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  System identification seminar class 0 1,105 14-02-2011, 03:26 PM
Last Post: seminar class
  strategy for optimizing manufacturing operations. full report project report tiger 0 2,699 17-02-2010, 03:12 PM
Last Post: project report tiger
  Optimizing design of spring using genetic algorithm full report computer science technology 0 3,188 24-01-2010, 10:56 PM
Last Post: computer science technology

Forum Jump: