A Review on Privacy and Security Improvement Mechanisms in MANETs

Authors

  • Kiran Kumar Kommineni Research Scholar, Department of Computer Science, Vikrama Simhapuri University, Nellore, AP.
  • Ande Prasad Professor, Department of Computer Science, Vikrama Simhapuri University, Nellore, AP.

Keywords:

SDN MANET, fixed infrastructure, SDN controller, security, models

Abstract

A wireless network called a Mobile Ad hoc Network (MANET) allows mobile devices or nodes to connect without the use of a permanent infrastructure. When fixed infrastructure is unavailable, unfeasible, or expensive, it is helpful. However, they are valuable in disaster recovery operations, military communication, automotive networks, outdoor events, and isolated places. MANETs confront issues with routing, resource management, security, and scalability. In the absence of a fixed infrastructure and centralized administration, MANETs, or Mobile Adhoc Networks, are groups of nodes that are mobile that dynamically construct brief-lived networks.[1] These networks are suffered from two major problems like energy conservation and another one is security due to attacks. Software Defined Networking (SDN) is the progressed communication system that isolates the system information plane from the control plane. It has been seen as an energy-efficient, layered, scalable, and dynamic technique to manage and control architectures for wireless and wired networks. to address the security-related challenges, MANET was integrated with the SDN controller.[2] SDN MANET denotes that the architecture is adapted to a particular operational need, ecosystem circumstances and equipment functioning. Network management, bandwidth control, enhanced security, and energy management while routing are some of the main advantages of SDN MANET. Here, the SDN controller is essential to the network's many different activities. In MANETs, already various techniques are available to maintain trust and provide security. But sometimes the performance of these models is poor if the numbers of nodes or attackers are varied in the network. There is a drastic change in the performance characteristics of the network like more power consumption, increased delay, huge packet loss, and dropped throughput. Due to these reasons, there is a need to propose some advanced models for MANET security along with improvement in performance metrics. To obtain better performance, we are planning to implement hybrid models in the SDN MANET environment.

Downloads

Download data is not yet available.

References

Al-Shareeda, Mahmood A., and Selvakumar Manickam. "Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation." Symmetry 14.8 (2022): 1543.

Khalid, Ammarah, Rana Asif Rehman, and Muhammad Burhan. "CBILEM: A novel energy-aware mobility handling protocol for SDN based NDN-MANETs." Ad Hoc Networks 140 (2023): 103049.

Kumar, Kiran, et al. "A Role of Artificial Intelligence in Healthcare Data for Diabetic People Affected by COVID-19." International Journal of Operations Research and Information Systems (IJORIS) 13.2 (2022): 1-13.

Sharma, Bhawna, and Rohit Vaid. "A Secure Key Management on ODMRP in Mesh-Based Multicast Network." Computational Intelligence for Engineering and Management Applications: Select Proceedings of CIEMA 2022. Singapore: Springer Nature Singapore, 2023. 521-530.

Zhang, Shuyan, et al. "Molecular Fingerprint Detection Using Raman and Infrared Spectroscopy Technologies for Cancer Detection: A Progress Review." Biosensors 13.5 (2023): 557.

Miriyala, S., and M. S. Sairam. "Lightweight group key management for data dissimilation for dynamic SDN MANET environments." J. Crit. Rev 7.3.

Miriyala, Suneel, and M. Satya Sai ram. "An Efficient Anonymous Authentication Scheme to Improve Security and Privacy in Large-Scale SDN-Based MANET." Proceedings of First International Conference on Computational Electronics for Wireless Communications: ICCWC 2021. Springer Singapore, 2022.

Kumar, K. Kiran, et al. "Safe and high secured ranked keyword search over an outsourced cloud data." 2017 International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2017.

Mdee, Abdueli Paulo, et al. "Impacts of location-privacy preserving schemes on vehicular applications." Vehicular Communications 36 (2022): 100499.

Grover, Jyoti. "Security of Vehicular Ad Hoc Networks using Blockchain: A comprehensive review." Vehicular Communications 34 (2022): 100458.

William, P., et al. "Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content." 2022 International conference on electronics and renewable systems (ICEARS). IEEE, 2022.

Reddy, N. Srikanth, et al. "Blockchain-Based Internet of Things Security and Reliability via SDN-Enabled 5G-VANETs." Journal of Pharmaceutical Negative Results (2022): 506-522.

Sutradhar, Shrabani, et al. "A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare." Healthcare Analytics 3 (2023): 100177.

Baudet, Arthur, Annabelle Mercier Oum-El-Kheir Aktouf, and Philippe Elbaz-Vincent. "Decentralized Public Key Infrastructure for Autonomous Embedded Systems." Proceedings of the 29th C&ESAR (2022): 99.

Kafetzis, Dimitrios, et al. "Software-defined networking meets software-defined radio in mobile ad hoc networks: state of the art and future directions." IEEE Access 10 (2022): 9989-10014.

Kommineni, Kiran Kumar, et al. "A Review on IoT-based Defensive Devices for Women Security." 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). Vol. 1. IEEE, 2023.

Grasias, S. John, and B. Sureshkumar. "Secured Multi-Agent Rapid Trusty Adhoc On-Demand Distance Vector (Smart-Aodv) Routing Protocol for Service Discovery Process in Manet." Journal of Survey in Fisheries Sciences 10.1S (2023): 5395-5411.

Reddy, Bhaskar, and B. Dhananjaya. "The AODV routing protocol with built-in security to counter black hole attack in MANET." Materials Today: Proceedings 50 (2022): 1152-1158.

Sirajuddin, Mohammad, Ch Rupa, and Ande Prasad. "A trusted model using improved-AODV in MANETS with packet loss reduction mechanism." Advances in Modelling and Analysis B 61.1 (2018): 15-22.

Sirajuddin, M. D., Ch Rupa, and A. Prasad. "An innovative security model to handle blackhole attack in MANET." Proceedings of International Conference on Computational Intelligence and Data Engineering: ICCIDE 2017. Springer Singapore, 2018.

D.J.Samatha Naidu, Dr.Ande Prasad. "SAMRAM adversary model to prevent security attacks and network degradation problems in wireless sensor networks "

Sirajuddin, M. D., Ch Rupa, and A. Prasad. "Advanced congestion control techniques for MANET." Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 1. Springer India, 2016.

A. ShakaybArsalaan and H. Nguyen, “Andrew coyle and MahrukhFida, “ quality of information with minimum requirments for emergency communications,” Adhoc Networks, vol. 111, pp. 1570–8705.

Mohammad Sirajuddin, Ch. Rupa, Celestine Iwendi, Cresantus Biamba, "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network", Security and Communication Networks, vol. 2021, Article ID 5521713, 9 pages, 2021. https://doi.org/10.1155/2021/5521713.

Downloads

Published

25.12.2023

How to Cite

Kommineni, K. K. ., & Prasad, A. . (2023). A Review on Privacy and Security Improvement Mechanisms in MANETs. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 90–99. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4224

Issue

Section

Research Article