Hierarchical Honey Bee Model to Avoid Sleep Deprivation Attack in MANET

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Ad-hoc networks are highly vulnerable to the attacks due to the dynamic nature of the network topology, lack of centralized management and cooperative algorithm. Nodes in the ad-hoc network are responsible to transmit packets to other nodes. One of many different kinds of attacks, a node may experience the exhaustion of power by consuming its batter power. Routing protocol controls the packet transmission over the network and calculates the routing path for transmission. The predefined static routed path is limited in ad-hoc network, and nodes have limited energy that is depleted due to transmission. Sleep deprivation attack constantly drops the power source on a particular node until the node gets shutdown. We have proposed an effective model named Honey-bee model to enhance Ad-hoc On-Demand Distance Vector Routing algorithm. Hierarchical clustering method is used for the formation of the cluster of nodes. Based on this approach, each node is assigned with a cluster that prevents the attack. We have simulated in ns2 tool compared results with other on-demand routing protocol such as Power Aware Routing Protocol, Dynamic Source Routing, Flow-State extensions to Dynamic Source Routing and AODV.

     

     

  • Keywords


    On-demand routing, sleep deprivation, hierarchical clustering, routing protocol.

  • References


      [1] Palaniappan S & Chellan K, “Energy-efficient stable routing using QoS monitoring agents in MANET”, EURASIP Journal on Wireless Communications and Networking, (2015).

      [2] Madhurikkha S & Sabitha R, “An Efficient Integral Power-Elector Method with Enhanced AODV to Avoid Sleep Deprivation in Manet”, Indian Journal of Science and Technology, (2016).

      [3] Calyam P, Ekici E, Lee CG, Haffner M & Howes N, “A “GAP-Model” based framework for online VVoIP QoE measurement”, Journal of Communications and Networks, Vol.9, No.4,(2006), pp.446-456.

      [4] Chang JY & Chen YW, “A cluster-based relay station deployment scheme for multi-hop relay networks”, Journal of Communications and networks, Vol.17, No.1,(2015), pp.84-92.

      [5] Pagurek BB & White T, “An adaptive scheduling scheme for cooperative energy harvesting networks”, Journal of Communications and Networks, Vol.17, No.3, (2015).

      [6] Peng F, Peng B & Leung VC, “An application oriented power saving MAC protocol for wireless sensor networks”, Wireless Personal Communications, Vol.67, No.2,(2012), pp.279-293.

      [7] Chang JY & Ju PH, “An efficient cluster-based power saving scheme for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, (2012).

      [8] Zhou Y, Huang Z, Wang J, Huang R & Yu D, “An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, (2014).

      [9] Nie N & Comaniciu C, “Energy efficient AODV routing in CDMA ad hoc networks using beamforming”, EURASIP Journal on Wireless Communications and Networking, (2006).

      [10] Kanakaris V, Ndzi DL, Ovaliadis K & Yang Y, “A new RREQ message forwarding technique based on Bayesian probability theory”, EURASIP Journal on Wireless Communications and Networking, (2012).

      [11] Abbas NI, Ilkan M & Ozen E, “Fuzzy approach to improving route stability of the AODV routing protocol”, EURASIP Journal on Wireless Communications and Networking, (2015).

      [12] Cheng ST, Shih JS, Chang TY, Horng GJ & Chou CL, “MLPA-conservation mechanism in wireless sensor network environments”, EURASIP Journal on Wireless Communications and Networking, (2012).

      [13] Smail O, Cousin B, Mekki R & Mekkakia Z, “A multipath energy-conserving routing protocol for wireless ad hoc networks lifetime improvement”, EURASIP Journal on Wireless Communications and Networking, (2014).

      [14] Jin Y, Xu J & Qiu L, “Energy-efficient scheduling with individual packet delay constraints and non-ideal circuit power”, Journal of Communications and Networks, Vol.16, No.1,(2014), pp.36-44.

      [15] Sarkar M & Roy DB, “Prevention of sleep deprivation attacks using clustering”, 3rd International Conference on Electronics Computer Technology (ICECT), Vol.5, (2011), pp.391-394.

      [16] Hamad S, Radhi N & Al-Raweshidy H, “Candidate Neighbours to Rebroadcast the RREQ for efficient flooding in mobile ad hoc network”, Wireless Advanced (WiAd), (2011), pp.26-29.

      [17] Wu J, Ren S, Jiang Y & Song L, “QoS-aware multihop routing in wireless sensor networks with power control using demodulation-and-forward protocol”, EURASI Journal on Wireless Communications and Networking, (2012).

      [18] Sharma AK, Sharma RK & Jain V, “An efficient power aware routing protocol for mobile adhoc networks using cluster head”, 3rd International Conference on Computing for Sustainable Global Development (INDIACom), (2016), pp.2955-2958.

      [19] Yang H, Tian C, Cheng B, Ci L, Wang Z & Yang M, “CDS-A Collaborative Dynamic Source Routing Protocol for Wireless Sensor Network”, Ubiquitous Intelligence and Computing and IEEE 12th Intl Conf on Autonomic and Trusted Computing and IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), (2015), pp. 617-621.

      [20] Ns-2 network simulator, 2008, http://www.isi.edu/nsnam/ns/

      [21] CMU Monarch BPensions to NS-2 , 2008

      http://www.monarch.cs.cmu.edu/cmu-ns.html

      [22] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns” , 2008

      http://web.uct.ac.za/depts/commnetwork/tutorial_ns_full.pdf

      [23] Installing OLSR on NS-2 , 2008.

      http://masimum.inf.um.es/um-olsr/html

      [24] Li S, Xiao S, Zhang M & Zhang X, “Power saving and improving the throughput of spectrum sharing in wideband cognitive radio networks”, Journal of Communications and Networks, Vol.17, No.4,(2015), pp.394-405.

      [25] Yen HH, Lee SS & Yap FG, “A novel optimization-based approach for minimum power multicast in wireless networks”, Journal of Communications and Networks, Vol.13, No.1,(2011), pp.26-31.

      [26] Quang PTA & Kim DS, “Clustering algorithm of hierarchical structures in large-scale wireless sensor and actuator networks”, Journal of Communications and Networks, Vol.17, No.5,(2015), pp.473-481.

      [27] Shin J & Suh C, “CREEC: Chain routing with even energy consumption”, Journal of Communications and Networks, Vol.13, No.1,(2011), pp.17-25.


 

View

Download

Article ID: 15133
 
DOI: 10.14419/ijet.v7i3.6.15133




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.