Hierarchical Honey Bee Model to Avoid Sleep Deprivation Attack in MANET
-
2018-07-04 https://doi.org/10.14419/ijet.v7i3.6.15133 -
On-demand routing, sleep deprivation, hierarchical clustering, routing protocol. -
Abstract
Ad-hoc networks are highly vulnerable to the attacks due to the dynamic nature of the network topology, lack of centralized management and cooperative algorithm. Nodes in the ad-hoc network are responsible to transmit packets to other nodes. One of many different kinds of attacks, a node may experience the exhaustion of power by consuming its batter power. Routing protocol controls the packet transmission over the network and calculates the routing path for transmission. The predefined static routed path is limited in ad-hoc network, and nodes have limited energy that is depleted due to transmission. Sleep deprivation attack constantly drops the power source on a particular node until the node gets shutdown. We have proposed an effective model named Honey-bee model to enhance Ad-hoc On-Demand Distance Vector Routing algorithm. Hierarchical clustering method is used for the formation of the cluster of nodes. Based on this approach, each node is assigned with a cluster that prevents the attack. We have simulated in ns2 tool compared results with other on-demand routing protocol such as Power Aware Routing Protocol, Dynamic Source Routing, Flow-State extensions to Dynamic Source Routing and AODV.
Â
 -
References
[1] Palaniappan S & Chellan K, “Energy-efficient stable routing using QoS monitoring agents in MANETâ€, EURASIP Journal on Wireless Communications and Networking, (2015).
[2] Madhurikkha S & Sabitha R, “An Efficient Integral Power-Elector Method with Enhanced AODV to Avoid Sleep Deprivation in Manetâ€, Indian Journal of Science and Technology, (2016).
[3] Calyam P, Ekici E, Lee CG, Haffner M & Howes N, “A “GAP-Model†based framework for online VVoIP QoE measurementâ€, Journal of Communications and Networks, Vol.9, No.4,(2006), pp.446-456.
[4] Chang JY & Chen YW, “A cluster-based relay station deployment scheme for multi-hop relay networksâ€, Journal of Communications and networks, Vol.17, No.1,(2015), pp.84-92.
[5] Pagurek BB & White T, “An adaptive scheduling scheme for cooperative energy harvesting networksâ€, Journal of Communications and Networks, Vol.17, No.3, (2015).
[6] Peng F, Peng B & Leung VC, “An application oriented power saving MAC protocol for wireless sensor networksâ€, Wireless Personal Communications, Vol.67, No.2,(2012), pp.279-293.
[7] Chang JY & Ju PH, “An efficient cluster-based power saving scheme for wireless sensor networksâ€, EURASIP Journal on Wireless Communications and Networking, (2012).
[8] Zhou Y, Huang Z, Wang J, Huang R & Yu D, “An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networksâ€, EURASIP Journal on Wireless Communications and Networking, (2014).
[9] Nie N & Comaniciu C, “Energy efficient AODV routing in CDMA ad hoc networks using beamformingâ€, EURASIP Journal on Wireless Communications and Networking, (2006).
[10] Kanakaris V, Ndzi DL, Ovaliadis K & Yang Y, “A new RREQ message forwarding technique based on Bayesian probability theoryâ€, EURASIP Journal on Wireless Communications and Networking, (2012).
[11] Abbas NI, Ilkan M & Ozen E, “Fuzzy approach to improving route stability of the AODV routing protocolâ€, EURASIP Journal on Wireless Communications and Networking, (2015).
[12] Cheng ST, Shih JS, Chang TY, Horng GJ & Chou CL, “MLPA-conservation mechanism in wireless sensor network environmentsâ€, EURASIP Journal on Wireless Communications and Networking, (2012).
[13] Smail O, Cousin B, Mekki R & Mekkakia Z, “A multipath energy-conserving routing protocol for wireless ad hoc networks lifetime improvementâ€, EURASIP Journal on Wireless Communications and Networking, (2014).
[14] Jin Y, Xu J & Qiu L, “Energy-efficient scheduling with individual packet delay constraints and non-ideal circuit powerâ€, Journal of Communications and Networks, Vol.16, No.1,(2014), pp.36-44.
[15] Sarkar M & Roy DB, “Prevention of sleep deprivation attacks using clusteringâ€, 3rd International Conference on Electronics Computer Technology (ICECT), Vol.5, (2011), pp.391-394.
[16] Hamad S, Radhi N & Al-Raweshidy H, “Candidate Neighbours to Rebroadcast the RREQ for efficient flooding in mobile ad hoc networkâ€, Wireless Advanced (WiAd), (2011), pp.26-29.
[17] Wu J, Ren S, Jiang Y & Song L, “QoS-aware multihop routing in wireless sensor networks with power control using demodulation-and-forward protocolâ€, EURASI Journal on Wireless Communications and Networking, (2012).
[18] Sharma AK, Sharma RK & Jain V, “An efficient power aware routing protocol for mobile adhoc networks using cluster headâ€, 3rd International Conference on Computing for Sustainable Global Development (INDIACom), (2016), pp.2955-2958.
[19] Yang H, Tian C, Cheng B, Ci L, Wang Z & Yang M, “CDS-A Collaborative Dynamic Source Routing Protocol for Wireless Sensor Networkâ€, Ubiquitous Intelligence and Computing and IEEE 12th Intl Conf on Autonomic and Trusted Computing and IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), (2015), pp. 617-621.
[20] Ns-2 network simulator, 2008, http://www.isi.edu/nsnam/ns/
[21] CMU Monarch BPensions to NS-2 , 2008
http://www.monarch.cs.cmu.edu/cmu-ns.html
[22] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns†, 2008
http://web.uct.ac.za/depts/commnetwork/tutorial_ns_full.pdf
[23] Installing OLSR on NS-2 , 2008.
http://masimum.inf.um.es/um-olsr/html
[24] Li S, Xiao S, Zhang M & Zhang X, “Power saving and improving the throughput of spectrum sharing in wideband cognitive radio networksâ€, Journal of Communications and Networks, Vol.17, No.4,(2015), pp.394-405.
[25] Yen HH, Lee SS & Yap FG, “A novel optimization-based approach for minimum power multicast in wireless networksâ€, Journal of Communications and Networks, Vol.13, No.1,(2011), pp.26-31.
[26] Quang PTA & Kim DS, “Clustering algorithm of hierarchical structures in large-scale wireless sensor and actuator networksâ€, Journal of Communications and Networks, Vol.17, No.5,(2015), pp.473-481.
[27] Shin J & Suh C, “CREEC: Chain routing with even energy consumptionâ€, Journal of Communications and Networks, Vol.13, No.1,(2011), pp.17-25.
-
Downloads
-
How to Cite
Madhurikkha, S., & Sabitha, R. (2018). Hierarchical Honey Bee Model to Avoid Sleep Deprivation Attack in MANET. International Journal of Engineering & Technology, 7(3.6), 358-363. https://doi.org/10.14419/ijet.v7i3.6.15133Received date: 2018-07-05
Accepted date: 2018-07-05
Published date: 2018-07-04